| rfc9153.original | rfc9153.txt | |||
|---|---|---|---|---|
| DRIP S. Card, Ed. | Internet Engineering Task Force (IETF) S. Card, Ed. | |||
| Internet-Draft A. Wiethuechter | Request for Comments: 9153 A. Wiethuechter | |||
| Intended status: Informational AX Enterprize | Category: Informational AX Enterprize | |||
| Expires: 12 March 2022 R. Moskowitz | ISSN: 2070-1721 R. Moskowitz | |||
| HTT Consulting | HTT Consulting | |||
| A. Gurtov | A. Gurtov | |||
| Linköping University | Linköping University | |||
| 8 September 2021 | February 2022 | |||
| Drone Remote Identification Protocol (DRIP) Requirements | Drone Remote Identification Protocol (DRIP) Requirements and Terminology | |||
| draft-ietf-drip-reqs-18 | ||||
| Abstract | Abstract | |||
| This document defines terminology and requirements for Drone Remote | This document defines terminology and requirements for solutions | |||
| Identification Protocol (DRIP) Working Group solutions to support | produced by the Drone Remote Identification Protocol (DRIP) Working | |||
| Unmanned Aircraft System Remote Identification and tracking (UAS RID) | Group. These solutions will support Unmanned Aircraft System Remote | |||
| for security, safety, and other purposes (e.g., initiation of | Identification and tracking (UAS RID) for security, safety, and other | |||
| identity based network sessions supporting UAS applications). DRIP | purposes (e.g., initiation of identity-based network sessions | |||
| will facilitate use of existing Internet resources to support RID and | supporting UAS applications). DRIP will facilitate use of existing | |||
| to enable enhanced related services, and will enable online and | Internet resources to support RID and to enable enhanced related | |||
| offline verification that RID information is trustworthy. | services, and it will enable online and offline verification that RID | |||
| information is trustworthy. | ||||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This document is not an Internet Standards Track specification; it is | |||
| provisions of BCP 78 and BCP 79. | published for informational purposes. | |||
| Internet-Drafts are working documents of the Internet Engineering | ||||
| Task Force (IETF). Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. The list of current Internet- | ||||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
| and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
| time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
| material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Not all documents | |||
| approved by the IESG are candidates for any level of Internet | ||||
| Standard; see Section 2 of RFC 7841. | ||||
| This Internet-Draft will expire on 12 March 2022. | Information about the current status of this document, any errata, | |||
| and how to provide feedback on it may be obtained at | ||||
| https://www.rfc-editor.org/info/rfc9153. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
| license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
| Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
| and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
| extracted from this document must include Simplified BSD License text | to this document. Code Components extracted from this document must | |||
| as described in Section 4.e of the Trust Legal Provisions and are | include Revised BSD License text as described in Section 4.e of the | |||
| provided without warranty as described in the Simplified BSD License. | Trust Legal Provisions and are provided without warranty as described | |||
| in the Revised BSD License. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
| 1.1. Motivation and External Influences . . . . . . . . . . . 3 | 1.1. Motivation and External Influences | |||
| 1.2. Concerns and Constraints . . . . . . . . . . . . . . . . 8 | 1.2. Concerns and Constraints | |||
| 1.3. DRIP Scope . . . . . . . . . . . . . . . . . . . . . . . 10 | 1.3. DRIP Scope | |||
| 1.4. Document Scope . . . . . . . . . . . . . . . . . . . . . 11 | 1.4. Document Scope | |||
| 2. Terms and Definitions . . . . . . . . . . . . . . . . . . . . 11 | 2. Terms and Definitions | |||
| 2.1. Requirements Terminology . . . . . . . . . . . . . . . . 11 | 2.1. Requirements Terminology | |||
| 2.2. Definitions . . . . . . . . . . . . . . . . . . . . . . . 11 | 2.2. Definitions | |||
| 3. UAS RID Problem Space . . . . . . . . . . . . . . . . . . . . 20 | 3. UAS RID Problem Space | |||
| 3.1. Network RID . . . . . . . . . . . . . . . . . . . . . . . 22 | 3.1. Network RID | |||
| 3.2. Broadcast RID . . . . . . . . . . . . . . . . . . . . . . 25 | 3.2. Broadcast RID | |||
| 3.3. USS in UTM and RID . . . . . . . . . . . . . . . . . . . 29 | 3.3. USS in UTM and RID | |||
| 3.4. DRIP Focus . . . . . . . . . . . . . . . . . . . . . . . 29 | 3.4. DRIP Focus | |||
| 4. Requirements . . . . . . . . . . . . . . . . . . . . . . . . 31 | 4. Requirements | |||
| 4.1. General . . . . . . . . . . . . . . . . . . . . . . . . . 31 | 4.1. General | |||
| 4.1.1. Normative Requirements . . . . . . . . . . . . . . . 31 | 4.1.1. Normative Requirements | |||
| 4.1.2. Rationale . . . . . . . . . . . . . . . . . . . . . . 32 | 4.1.2. Rationale | |||
| 4.2. Identifier . . . . . . . . . . . . . . . . . . . . . . . 34 | 4.2. Identifier | |||
| 4.2.1. Normative Requirements . . . . . . . . . . . . . . . 34 | 4.2.1. Normative Requirements | |||
| 4.2.2. Rationale . . . . . . . . . . . . . . . . . . . . . . 35 | 4.2.2. Rationale | |||
| 4.3. Privacy . . . . . . . . . . . . . . . . . . . . . . . . . 36 | 4.3. Privacy | |||
| 4.3.1. Normative Requirements . . . . . . . . . . . . . . . 36 | 4.3.1. Normative Requirements | |||
| 4.3.2. Rationale . . . . . . . . . . . . . . . . . . . . . . 37 | 4.3.2. Rationale | |||
| 4.4. Registries . . . . . . . . . . . . . . . . . . . . . . . 37 | 4.4. Registries | |||
| 4.4.1. Normative Requirements . . . . . . . . . . . . . . . 38 | 4.4.1. Normative Requirements | |||
| 4.4.2. Rationale . . . . . . . . . . . . . . . . . . . . . . 38 | 4.4.2. Rationale | |||
| 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 39 | 5. IANA Considerations | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 39 | 6. Security Considerations | |||
| 7. Privacy and Transparency Considerations . . . . . . . . . . . 40 | 7. Privacy and Transparency Considerations | |||
| 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 41 | 8. References | |||
| 8.1. Normative References . . . . . . . . . . . . . . . . . . 41 | 8.1. Normative References | |||
| 8.2. Informative References . . . . . . . . . . . . . . . . . 42 | 8.2. Informative References | |||
| Appendix A. Discussion and Limitations . . . . . . . . . . . . . 46 | Appendix A. Discussion and Limitations | |||
| Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 47 | Acknowledgments | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 48 | Authors' Addresses | |||
| 1. Introduction | 1. Introduction | |||
| For any unfamiliar or _a priori_ ambiguous terminology herein, see | This document defines terminology and requirements for solutions | |||
| produced by the Drone Remote Identification Protocol (DRIP) Working | ||||
| Group. These solutions will support Unmanned Aircraft System Remote | ||||
| Identification and tracking (UAS RID) for security, safety, and other | ||||
| purposes (e.g., initiation of identity-based network sessions | ||||
| supporting UAS applications). DRIP will facilitate use of existing | ||||
| Internet resources to support RID and to enable enhanced related | ||||
| services, and it will enable online and offline verification that RID | ||||
| information is trustworthy. | ||||
| For any unfamiliar or a priori ambiguous terminology herein, see | ||||
| Section 2. | Section 2. | |||
| 1.1. Motivation and External Influences | 1.1. Motivation and External Influences | |||
| Many considerations (especially safety and security) necessitate | Many considerations (especially safety and security) necessitate | |||
| Unmanned Aircraft Systems (UAS) Remote Identification and tracking | Unmanned Aircraft System Remote Identification and tracking (UAS | |||
| (RID). | RID). | |||
| Unmanned Aircraft (UA) may be fixed wing, rotary wing (e.g., | Unmanned Aircraft (UA) may be fixed-wing, rotary-wing (e.g., | |||
| helicopter), hybrid, balloon, rocket, etc. Small fixed wing UA | helicopter), hybrid, balloon, rocket, etc. Small fixed-wing UA | |||
| typically have Short Take-Off and Landing (STOL) capability; rotary | typically have Short Take-Off and Landing (STOL) capability; rotary- | |||
| wing and hybrid UA typically have Vertical Take-Off and Landing | wing and hybrid UA typically have Vertical Take-Off and Landing | |||
| (VTOL) capability. UA may be single- or multi-engine. The most | (VTOL) capability. UA may be single- or multi-engine. The most | |||
| common today are multicopters: rotary wing, multi engine. The | common today are multicopters (rotary-wing, multi-engine). The | |||
| explosion in UAS was enabled by hobbyist development, for | explosion in UAS was enabled by hobbyist development of advanced | |||
| multicopters, of advanced flight stability algorithms, enabling even | flight stability algorithms for multicopters that enabled even | |||
| inexperienced pilots to take off, fly to a location of interest, | inexperienced pilots to take off, fly to a location of interest, | |||
| hover, and return to the take-off location or land at a distance. | hover, and return to the takeoff location or land at a distance. UAS | |||
| UAS can be remotely piloted by a human (e.g., with a joystick) or | can be remotely piloted by a human (e.g., with a joystick) or | |||
| programmed to proceed from Global Navigation Satellite System (GNSS) | programmed to proceed from Global Navigation Satellite System (GNSS) | |||
| waypoint to waypoint in a weak form of autonomy; stronger autonomy is | waypoint to waypoint in a weak form of autonomy; stronger autonomy is | |||
| coming. | coming. | |||
| Small UA are "low observable" as they: | Small UA are "low observable" as they: | |||
| * typically have small radar cross sections; | * typically have small radar cross sections; | |||
| * make noise quite noticeable at short ranges but difficult to | * make noise that is quite noticeable at short ranges but difficult | |||
| detect at distances they can quickly close (500 meters in under 13 | to detect at distances they can quickly close (500 meters in under | |||
| seconds by the fastest consumer mass market drones available in | 13 seconds by the fastest consumer mass-market drones available in | |||
| early 2021); | early 2021); | |||
| * typically fly at low altitudes (e.g., for those to which RID | * typically fly at low altitudes (e.g., under 400 feet Above Ground | |||
| applies in the US, under 400 feet Above Ground Level (AGL) as per | Level (AGL) for UA to which RID applies in the US, as per | |||
| [Part107]); | [Part107]); and | |||
| * are highly maneuverable so can fly under trees and between | * are highly maneuverable and thus can fly under trees and between | |||
| buildings. | buildings. | |||
| UA can carry payloads including sensors, cyber and kinetic weapons, | UA can carry payloads (including sensors, cyber weapons, and kinetic | |||
| or can be used themselves as weapons by flying them into targets. | weapons) or can be used themselves as weapons by flying them into | |||
| They can be flown by clueless, careless, or criminal operators. Thus | targets. They can be flown by clueless, careless, or criminal | |||
| the most basic function of UAS RID is "Identification Friend or Foe" | operators. Thus, the most basic function of UAS RID is | |||
| (IFF) to mitigate the significant threat they present. | "Identification Friend or Foe (IFF)" to mitigate the significant | |||
| threat they present. | ||||
| Diverse other applications can be enabled or facilitated by RID. | Diverse other applications can be enabled or facilitated by RID. | |||
| Internet protocols typically start out with at least one entity | Internet protocols typically start out with at least one entity | |||
| already knowing an identifier or locator of another; but an entity | already knowing an identifier or locator of another; but an entity | |||
| (e.g., UAS or Observer device) encountering an _a priori_ unknown UA | (e.g., UAS or Observer device) encountering an a priori unknown UA in | |||
| in physical space has no identifier or logical space locator for that | physical space has no identifier or logical space locator for that | |||
| UA, unless and until one is provided somehow. RID provides an | UA, unless and until one is provided somehow. RID provides an | |||
| identifier, which, if well chosen, can facilitate use of a variety of | identifier, which, if well chosen, can facilitate use of a variety of | |||
| Internet family protocols and services to support arbitrary | Internet family protocols and services to support arbitrary | |||
| applications, beyond the basic security functions of RID. For most | applications beyond the basic security functions of RID. For most of | |||
| of these, some type of identifier is essential, e.g., Network Access | these, some type of identifier is essential, e.g., Network Access | |||
| Identifier (NAI), Digital Object Identifier (DOI), Uniform Resource | Identifier (NAI), Digital Object Identifier (DOI), Uniform Resource | |||
| Identifier (URI), domain name, or public key. DRIP motivations | Identifier (URI), domain name, or public key. DRIP motivations | |||
| include both the basic security and the broader application support | include both the basic security and the broader application support | |||
| functions of RID. The general scenario is illustrated in Figure 1. | functions of RID. The general scenario is illustrated in Figure 1. | |||
| +-----+ +-----+ | +-----+ +-----+ | |||
| | UA1 | | UA2 | | | UA1 | | UA2 | | |||
| +-----+ +-----+ | +-----+ +-----+ | |||
| +----------+ +----------+ | +----------+ +----------+ | |||
| skipping to change at page 4, line 46 ¶ | skipping to change at line 194 ¶ | |||
| ************* | ************* | |||
| | | | | | | | | |||
| +----------+ | | | +----------+ | +----------+ | | | +----------+ | |||
| | Public o---/ | \---o Private | | | Public o---/ | \---o Private | | |||
| | Registry | | | Registry | | | Registry | | | Registry | | |||
| +----------+ | +----------+ | +----------+ | +----------+ | |||
| +--o--+ | +--o--+ | |||
| | DNS | | | DNS | | |||
| +-----+ | +-----+ | |||
| Figure 1: "General UAS RID Usage Scenario" | Figure 1: General UAS RID Usage Scenario | |||
| Figure 1 illustrates a typical case where there may be: multiple | Figure 1 illustrates a typical case where there may be the following: | |||
| Observers, some of them members of the general public, others | ||||
| government officers with public safety/security responsibilities; | * multiple Observers, some of them members of the general public and | |||
| multiple UA in flight within observation range, each with its own | others government officers with public safety and security | |||
| pilot/operator; at least one registry each for lookup of public and | responsibilities, | |||
| (by authorized parties only) private information regarding the UAS | ||||
| and their pilots/operators; and in the DRIP vision, DNS resolving | * multiple UA in flight within observation range, each with its own | |||
| various identifiers and locators of the entities involved. | pilot/operator, | |||
| * at least one registry each for lookup of public and (by authorized | ||||
| parties only) private information regarding the UAS and their | ||||
| pilots/operators, and | ||||
| * in the DRIP vision, DNS resolving various identifiers and locators | ||||
| of the entities involved. | ||||
| Note the absence of any links to/from the UA in the figure; this is | Note the absence of any links to/from the UA in the figure; this is | |||
| because UAS RID and other connectivity involving the UA varies. Some | because UAS RID and other connectivity involving the UA varies. Some | |||
| connectivity paths do or do not exist depending upon the scenario. | connectivity paths do or do not exist depending upon the scenario. | |||
| Command and Control (C2) from the GCS to the UA via the Internet | Command and Control (C2) from the Ground Control Station (GCS) to the | |||
| (e.g., using LTE cellular) is expected to become much more common as | UA via the Internet (e.g., using LTE cellular) is expected to become | |||
| Beyond Visual Line Of Sight (BVLOS) operations increase; in such a | much more common as Beyond Visual Line Of Sight (BVLOS) operations | |||
| case, there is typically not also a direct wireless link between the | increase; in such a case, there is typically not also a direct | |||
| GCS and UA. Conversely, if C2 is running over a direct wireless | wireless link between the GCS and UA. Conversely, if C2 is running | |||
| link, then typically the GCS has but the UA lacks Internet | over a direct wireless link, then the GCS typically has Internet | |||
| connectivity. Further, paths that nominally exist, such as between | connectivity, but the UA does not. Further, paths that nominally | |||
| an Observer device and the Internet, may be severely intermittent. | exist, such as between an Observer device and the Internet, may be | |||
| These connectivity constraints are likely to have an impact, e.g., on | severely intermittent. These connectivity constraints are likely to | |||
| how reliably DRIP requirements can be satisfied. | have an impact, e.g., on how reliably DRIP requirements can be | |||
| satisfied. | ||||
| An Observer of UA may need to classify them, as illustrated | An Observer of UA may need to classify them, as illustrated | |||
| notionally in Figure 2, for basic airspace Situational Awareness | notionally in Figure 2, for basic airspace Situational Awareness | |||
| (SA). An Observer who classifies a UAS: as Taskable, can ask it to | (SA). An Observer can classify a UAS as one of the following and | |||
| do something useful; as Low Concern, can reasonably assume it is not | treat as: | |||
| malicious and would cooperate with requests to modify its flight | ||||
| plans for safety concerns that arise; as High Concern or | * Taskable: can ask it to do something useful. | |||
| Unidentified, can focus surveillance on it. | ||||
| * Low Concern: can reasonably assume it is not malicious and would | ||||
| cooperate with requests to modify its flight plans for safety | ||||
| concerns that arise. | ||||
| * High Concern or Unidentified: can focus surveillance on it. | ||||
| xxxxxxx | xxxxxxx | |||
| x x No +--------------+ | x x No +--------------+ | |||
| x ID? x+---->| Unidentified | | x ID? x+---->| Unidentified | | |||
| x x +--------------+ | x x +--------------+ | |||
| xxxxxxx | xxxxxxx | |||
| + | + | |||
| | Yes | | Yes | |||
| v | v | |||
| xxxxxxx | xxxxxxx | |||
| x x | x x | |||
| .---------+x Type? x+----------. | .---------+x Type? x+----------. | |||
| | x x | | | x x | | |||
| | xxxxxxx | | | xxxxxxx | | |||
| | + | | | + | | |||
| v v v | v v v | |||
| +--------------+ +--------------+ +--------------+ | +--------------+ +--------------+ +--------------+ | |||
| | Taskable | | Low Concern | | High Concern | | | Taskable | | Low Concern | | High Concern | | |||
| +--------------+ +--------------+ +--------------+ | +--------------+ +--------------+ +--------------+ | |||
| Figure 2: "Notional UAS Classification" | Figure 2: Notional UAS Classification | |||
| ASTM International, Technical Committee F38 (UAS), Subcommittee | The widely cited "Standard Specification for Remote ID and Tracking" | |||
| F38.02 (Aircraft Operations), Work Item WK65041, developed the widely | [F3411-19] was developed by ASTM International, Technical Committee | |||
| cited Standard Specification for Remote ID and Tracking [F3411-19]: | F38 (UAS), Subcommittee F38.02 (Aircraft Operations), Work Item | |||
| the published standard is available for purchase from ASTM and as an | WK65041. The published standard is available for purchase from ASTM | |||
| ASTM membership premium; early drafts are freely available as | and is also available as an ASTM membership premium; early draft | |||
| [OpenDroneID] specifications. [F3411-19] is frequently referenced in | versions are freely available as Open Drone ID specifications | |||
| DRIP, where building upon its link layers and both enhancing support | [OpenDroneID]. [F3411-19] is frequently referenced in DRIP, where | |||
| for and expanding the scope of its applications are central foci. | building upon its link layers and both enhancing support for and | |||
| expanding the scope of its applications are central foci. | ||||
| In many applications, including UAS RID, identification and | In many applications, including UAS RID, identification and | |||
| identifiers are not ends in themselves; they exist to enable lookups | identifiers are not ends in themselves; they exist to enable lookups | |||
| and provision of other services. | and provision of other services. | |||
| Using UAS RID to facilitate vehicular (V2X) communications and | Using UAS RID to facilitate vehicular (i.e., Vehicle-to-Everything | |||
| applications such as Detect And Avoid (DAA), which would impose | (V2X)) communications and applications such as Detect And Avoid | |||
| tighter latency bounds than RID itself, is an obvious possibility, | (DAA), which would impose tighter latency bounds than RID itself, is | |||
| explicitly contemplated in the United States (US) Federal Aviation | an obvious possibility; this is explicitly contemplated in the | |||
| Administration (FAA) Remote Identification of Unmanned Aircraft rule | "Remote Identification of Unmanned Aircraft" rule of the US Federal | |||
| [FRUR]. However, usage of RID systems and information beyond mere | Aviation Administration (FAA) [FRUR]. However, usage of RID systems | |||
| identification (primarily to hold operators accountable after the | and information beyond mere identification (primarily to hold | |||
| fact), including DAA, have been declared out of scope in ASTM F38.02 | operators accountable after the fact), including DAA, were declared | |||
| WK65041, based on a distinction between RID as a security standard vs | out of scope in ASTM F38.02 WK65041, based on a distinction between | |||
| DAA as a safety application. Aviation community Standards | RID as a security standard versus DAA as a safety application. | |||
| Development Organizations (SDOs) generally set a higher bar for | Standards Development Organizations (SDOs) in the aviation community | |||
| safety than for security, especially with respect to reliability. | generally set a higher bar for safety than for security, especially | |||
| Each SDO has its own cultural set of connotations of safety vs | with respect to reliability. Each SDO has its own cultural set of | |||
| security; the denotative definitions of the International Civil | connotations of safety versus security; the denotative definitions of | |||
| Aviation Organization (ICAO) are cited in Section 2. | the International Civil Aviation Organization (ICAO) are cited in | |||
| Section 2. | ||||
| [Opinion1] and [WG105] cite the Direct Remote Identification (DRI) | [Opinion1] and [WG105] cite the Direct Remote Identification (DRI) | |||
| previously required and specified, explicitly stating that whereas | previously required and specified, explicitly stating that whereas | |||
| DRI is primarily for security purposes, the "Network Identification | DRI is primarily for security purposes, the "Network Identification | |||
| Service" [Opinion1] (in the context of U-space [InitialView]) or | Service" [Opinion1] (in the context of U-space [InitialView]) or | |||
| "Electronic Identification" [WG105] is primarily for safety purposes | "Electronic Identification" [WG105] is primarily for safety purposes | |||
| (e.g., Air Traffic Management, especially hazards deconfliction) and | (e.g., Air Traffic Management, especially hazards deconfliction) and | |||
| also is allowed to be used for other purposes such as support of | also is allowed to be used for other purposes such as support of | |||
| efficient operations. These emerging standards allow the security | efficient operations. These emerging standards allow the security- | |||
| and safety oriented systems to be separate or merged. In addition to | and safety-oriented systems to be separate or merged. In addition to | |||
| mandating both Broadcast and Network one-way to Observers, they will | mandating both Broadcast and Network RID one-way to Observers, they | |||
| use V2V to other UAS (also likely to and/or from some manned | will use Vehicle-to-Vehicle (V2V) to other UAS (also likely to and/or | |||
| aircraft). These reflect the broad scope of the European Union (EU) | from some manned aircraft). These reflect the broad scope of the | |||
| U-space concept, as being developed in the Single European Sky ATM | European Union (EU) U-space concept, as being developed in the Single | |||
| Research (SESAR) Joint Undertaking, the U-space architectural | European Sky ATM Research (SESAR) Joint Undertaking, the U-space | |||
| principles of which are outlined in [InitialView]. | architectural principles of which are outlined in [InitialView]. | |||
| ASD-STAN is an Associated Body to CEN (European Committee for | ASD-STAN is an Associated Body to CEN (European Committee for | |||
| Standardization) for Aerospace Standards. It is publishing an EU | Standardization) for Aerospace Standards. It has published an EU | |||
| standard "Aerospace series - Unmanned Aircraft Systems - Part 002: | standard titled "Aerospace series - Unmanned Aircraft Systems - Part | |||
| 002: Direct Remote Identification" [ASDSTAN4709-002]; a current | ||||
| (early 2021) informal overview is freely available in [ASDRI] (note | ||||
| that [ASDRI] may not precisely reflect the final standard as it was | ||||
| published before [ASDSTAN4709-002]). It will provide compliance to | ||||
| cover the identical DRI requirements applicable to drones of the | ||||
| following classes: | ||||
| Direct Remote Identification; English version prEN 4709-002:2020" for | * C1 ([Delegated], Part 2) | |||
| which a current (early 2021) informal overview is freely available in | ||||
| [ASDRI]. It will provide compliance to cover the identical DRI | * C2 ([Delegated], Part 3) | |||
| requirements applicable to drones of classes C1 - [Delegated] Part 2, | ||||
| C2 - [Delegated] Part 3, C3 - [Delegated] Part 4, C5 - [Amended] Part | * C3 ([Delegated], Part 4) | |||
| 16, and C6 - [Amended] Part 17. | ||||
| * C5 ([Amended], Part 16) | ||||
| * C6 ([Amended], Part 17) | ||||
| The standard contemplated in [ASDRI] will provide UA capability to be | The standard contemplated in [ASDRI] will provide UA capability to be | |||
| identified in real time during the whole duration of the flight, | identified in real time during the whole duration of the flight, | |||
| without specific connectivity or ground infrastructure link, | without specific connectivity or ground infrastructure link, | |||
| utilizing existing mobile devices within broadcast range. It will | utilizing existing mobile devices within broadcast range. It will | |||
| use Bluetooth 4, Bluetooth 5, Wi-Fi Neighbor Awareness Networking | use Bluetooth 4, Bluetooth 5, Wi-Fi Neighbor Awareness Networking | |||
| (NAN, also known as Wi-Fi Aware, [WiFiNAN]) and/or IEEE 802.11 Beacon | (NAN) (also known as "Wi-Fi Aware" [WiFiNAN]), and/or IEEE 802.11 | |||
| modes. The EU standard emphasis was compatibility with [F3411-19], | Beacon modes. The emphasis of the EU standard is compatibility with | |||
| although there are differences in mandatory and optional message | [F3411-19], although there are differences in mandatory and optional | |||
| types and fields. | message types and fields. | |||
| The [ASDRI] contemplated DRI system will broadcast locally: | The DRI system contemplated in [ASDRI] will broadcast the following | |||
| locally: | ||||
| 1. the UAS operator registration number; | 1. the UAS operator registration number; | |||
| 2. the [CTA2063A] compliant unique serial number of the UA; | 2. the [CTA2063A]-compliant unique serial number of the UA; | |||
| 3. a time stamp, the geographical position of the UA, and its height | 3. a time stamp, the geographical position of the UA, and its height | |||
| AGL or above its take-off point; | AGL or above its takeoff point; | |||
| 4. the UA ground speed and route course measured clockwise from true | 4. the UA ground speed and route course measured clockwise from true | |||
| north; | north; | |||
| 5. the geographical position of the remote pilot, or if that is not | 5. the geographical position of the Remote Pilot, or if that is not | |||
| available, the geographical position of the UA take-off point; | available, the geographical position of the UA takeoff point; and | |||
| and | ||||
| 6. for Classes C1, C2, C3, the UAS emergency status. | 6. for classes C1, C2, C3, the UAS emergency status. | |||
| Under the [ASDRI] contemplated standard, data will be sent in plain | Under the standard contemplated in [ASDRI], data will be sent in | |||
| text and the UAS operator registration number will be represented as | plaintext, and the UAS operator registration number will be | |||
| a 16-byte string including the (European) state code. The | represented as a 16-byte string including the (European) state code. | |||
| corresponding private ID part will contain 3 characters that are not | The corresponding private ID part will contain three characters that | |||
| broadcast but used by authorities to access regional registration | are not broadcast but used by authorities to access regional | |||
| databases for verification. | registration databases for verification. | |||
| ASD-STAN also contemplates corresponding Network Remote | ASD-STAN also contemplates corresponding Network Remote | |||
| Identification (NRI) functionality. The ASD-STAN RID target is to | Identification (NRI) functionality. ASD-STAN plans to revise their | |||
| revise their current standard with additional functionality (e.g., | current standard with additional functionality (e.g., DRIP) to be | |||
| DRIP) to be published before 2022 [ASDRI]. | published no later than 2022 [ASDRI]. | |||
| Security oriented UAS RID essentially has two goals: enable the | Security-oriented UAS RID essentially has two goals: 1) enable the | |||
| general public to obtain and record an opaque ID for any observed UA, | general public to obtain and record an opaque ID for any observed UA, | |||
| which they can then report to authorities; and enable authorities, | which they can then report to authorities and 2) enable authorities, | |||
| from such an ID, to look up information about the UAS and its | from such an ID, to look up information about the UAS and its | |||
| operator. Safety oriented UAS RID has stronger requirements. | operator. Safety-oriented UAS RID has stronger requirements. | |||
| Although dynamic establishment of secure communications between the | Dynamic establishment of secure communications between the Observer | |||
| Observer and the UAS pilot seems to have been contemplated by the FAA | and the UAS pilot seems to have been contemplated by the FAA UAS ID | |||
| UAS ID and Tracking Aviation Rulemaking Committee (ARC) in their | and Tracking Aviation Rulemaking Committee (ARC) in | |||
| [Recommendations], it is not addressed in any of the | [Recommendations]; however, aside from DRIP, it is not addressed in | |||
| subsequent regulations or international SDO technical specifications, | any of the subsequent regulations or international SDO technical | |||
| other than DRIP, known to the authors as of early 2021. | specifications known to the authors as of early 2021. | |||
| 1.2. Concerns and Constraints | 1.2. Concerns and Constraints | |||
| Disambiguation of multiple UA flying in close proximity may be very | Disambiguation of multiple UA flying in close proximity may be very | |||
| challenging, even if each is reporting its identity, position, and | challenging, even if each is reporting its identity, position, and | |||
| velocity as accurately as it can. | velocity as accurately as it can. | |||
| The origin of information in UAS RID and UAS Traffic Management (UTM) | The origin of information in UAS RID and UAS Traffic Management (UTM) | |||
| generally is the UAS or its operator. Self-reports may be initiated | generally is the UAS or its operator. Self-reports may be initiated | |||
| by the remote pilot at the console of the Ground Control Station | by the Remote Pilot at the console of the GCS (the UAS subsystem used | |||
| (GCS, the UAS subsystem used to remotely operate the UA), or | to remotely operate the UA) or automatically by GCS software; in | |||
| automatically by GCS software; in Broadcast RID, they typically would | Broadcast RID, they are typically initiated automatically by a | |||
| be initiated automatically by a process on the UA. Data in the | process on the UA. Data in the reports may come from sensors | |||
| reports may come from sensors available to the operator (e.g., radar | available to the operator (e.g., radar or cameras), the GCS (e.g., | |||
| or cameras), the GCS (e.g., "dead reckoning" UA location, starting | "dead reckoning" UA location, starting from the takeoff location and | |||
| from the takeoff location and estimating the displacements due to | estimating the displacements due to subsequent piloting commands, | |||
| subsequent piloting commands, wind, etc.), or the UA itself (e.g., an | wind, etc.), or the UA itself (e.g., an on-board GNSS receiver). In | |||
| on-board GNSS receiver); in Broadcast RID, all the data must be sent | Broadcast RID, all the data must be sent proximately by the UA, and | |||
| proximately by, and most of the data comes ultimately from, the UA | most of the data ultimately comes from the UA. Whether information | |||
| itself. Whether information comes proximately from the operator, or | comes proximately from the operator or from automated systems | |||
| from automated systems configured by the operator, there are | configured by the operator, there are possibilities of unintentional | |||
| possibilities not only of unintentional error in but also of | error in and intentional falsification of this data. Mandating UAS | |||
| intentional falsification of this data. Mandating UAS RID, | RID, specifying data elements required to be sent, monitoring | |||
| specifying data elements required to be sent, monitoring compliance | compliance, and enforcing compliance (or penalizing non-compliance) | |||
| and enforcing it (or penalizing non-compliance) are matters for Civil | are matters for Civil Aviation Authorities (CAAs) and potentially | |||
| Aviation Authorities (CAAs) et al; specifying message formats, etc. | other authorities. Specifying message formats and supporting | |||
| to carry those data elements has been addressed by other SDOs; | technologies to carry those data elements has been addressed by other | |||
| offering technical means, as extensions to external standards, to | SDOs. Offering technical means, as extensions to external standards, | |||
| facilitate verifiable compliance and enforcement/monitoring, are | to facilitate verifiable compliance and enforcement/monitoring is an | |||
| opportunities for DRIP. | opportunity for DRIP. | |||
| Minimal specified information must be made available to the public. | Minimal specified information must be made available to the public. | |||
| Access to other data, e.g., UAS operator Personally Identifiable | Access to other data, e.g., UAS operator Personally Identifiable | |||
| Information (PII), must be limited to strongly authenticated | Information (PII), must be limited to strongly authenticated | |||
| personnel, properly authorized in accordance with applicable policy. | personnel, properly authorized in accordance with applicable policy. | |||
| The balance between privacy and transparency remains a subject for | The balance between privacy and transparency remains a subject for | |||
| public debate and regulatory action; DRIP can only offer tools to | public debate and regulatory action; DRIP can only offer tools to | |||
| expand the achievable trade space and enable trade-offs within that | expand the achievable trade space and enable trade-offs within that | |||
| space. [F3411-19], the basis for most current (2021) thinking about | space. [F3411-19], the basis for most current (2021) thinking about | |||
| and efforts to provide UAS RID, specifies only how to get the UAS ID | and efforts to provide UAS RID, specifies only how to get the UAS ID | |||
| to the Observer: how the Observer can perform these lookups and how | to the Observer: how the Observer can perform these lookups and how | |||
| the registries first can be populated with information are | the registries first can be populated with information are not | |||
| unspecified therein. | specified therein. | |||
| The need for nearly universal deployment of UAS RID is pressing: | The need for nearly universal deployment of UAS RID is pressing: | |||
| consider how negligible the value of an automobile license plate | consider how negligible the value of an automobile license plate | |||
| system would be if only 90% of the cars displayed plates. This | system would be if only 90% of the cars displayed plates. This | |||
| implies the need to support use by Observers of already ubiquitous | implies the need to support use by Observers of already-ubiquitous | |||
| mobile devices (typically smartphones and tablets). Anticipating CAA | mobile devices (typically smartphones and tablets). Anticipating CAA | |||
| requirements to support legacy devices, especially in light of | requirements to support legacy devices, especially in light of | |||
| [Recommendations], [F3411-19] specifies that any UAS sending | [Recommendations], [F3411-19] specifies that any UAS sending | |||
| Broadcast RID over Bluetooth must do so over Bluetooth 4, regardless | Broadcast RID over Bluetooth must do so over Bluetooth 4, regardless | |||
| of whether it also does so over newer versions; as UAS sender devices | of whether it also does so over newer versions. As UAS sender | |||
| and Observer receiver devices are unpaired, this implies extremely | devices and Observer receiver devices are unpaired, this unpaired | |||
| short "advertisement" (beacon) frames. | state requires use of the extremely short BT4 "advertisement" | |||
| (beacon) frames. | ||||
| Wireless data links to or from UA are challenging. Flight is often | Wireless data links to or from UA are challenging. Flight is often | |||
| amidst structures and foliage at low altitudes over varied terrain. | amidst structures and foliage at low altitudes over varied terrain. | |||
| UA are constrained in both total energy and instantaneous power by | UA are constrained in both total energy and instantaneous power by | |||
| their batteries. Small UA imply small antennas. Densely populated | their batteries. Small UA imply small antennas. Densely populated | |||
| volumes will suffer from link congestion: even if UA in an airspace | volumes will suffer from link congestion: even if UA in an airspace | |||
| volume are few, other transmitters nearby on the ground, sharing the | volume are few, other transmitters nearby on the ground, sharing the | |||
| same license free spectral band, may be many. Thus air to air and | same license free spectral band, may be many. Thus, air-to-air and | |||
| air to ground links will generally be slow and unreliable. | air-to-ground links will generally be slow and unreliable. | |||
| UAS Cost, Size, Weight, and Power (CSWaP) constraints are severe. | UAS Cost, Size, Weight, and Power (CSWaP) constraints are severe. | |||
| CSWaP is a burden not only on the designers of new UAS for sale, but | CSWaP is a burden not only on the designers of new UAS for sale but | |||
| also on owners of existing UAS that must be retrofit. Radio | also on owners of existing UAS that must be retrofit. Radio | |||
| Controlled (RC) aircraft modelers, "hams" who use licensed amateur | Controlled (RC) aircraft modelers, "hams" who use licensed amateur | |||
| radio frequencies to control UAS, drone hobbyists, and others who | radio frequencies to control UAS, drone hobbyists, and others who | |||
| custom build UAS, all need means of participating in UAS RID, | custom build UAS all need means of participating in UAS RID that are | |||
| sensitive to both generic CSWaP and application-specific | sensitive to both generic CSWaP and application-specific | |||
| considerations. | considerations. | |||
| To accommodate the most severely constrained cases, all these | To accommodate the most severely constrained cases, all of the | |||
| conspire to motivate system design decisions that complicate the | concerns described above conspire to motivate system design decisions | |||
| protocol design problem. | that complicate the protocol design problem. | |||
| Broadcast RID uses one-way local data links. UAS may have Internet | Broadcast RID uses one-way local data links. UAS may have Internet | |||
| connectivity only intermittently, or not at all, during flight. | connectivity only intermittently, or not at all, during flight. | |||
| Internet-disconnected operation of Observer devices has been deemed | Internet-disconnected operation of Observer devices has been deemed | |||
| by ASTM F38.02 too infrequent to address. However, the preamble to | by ASTM F38.02 as too infrequent to address. However, the preamble | |||
| [FRUR] cites "remote and rural areas that do not have reliable | to [FRUR] cites "remote and rural areas that do not have reliable | |||
| Internet access" as a major reason for requiring Broadcast rather | Internet access" as a major reason for requiring Broadcast rather | |||
| than Network RID, and states that "Personal wireless devices that are | than Network RID. [FRUR] also states: | |||
| capable of receiving 47 CFR part 15 frequencies, such as smart | ||||
| phones, tablets, or other similar commercially available devices, | | Personal wireless devices that are capable of receiving 47 CFR | |||
| will be able to receive broadcast remote identification information | | part 15 frequencies, such as smart phones, tablets, or other | |||
| directly without reliance on an Internet connection". Internet- | | similar commercially available devices, will be able to receive | |||
| disconnected operation presents challenges, e.g., for Observers | | broadcast remote identification information directly without | |||
| needing access to the [F3411-19] web based Broadcast Authentication | | reliance on an Internet connection. | |||
| Verifier Service or needing to do external lookups. | ||||
| Internet-disconnected operation presents challenges, e.g., for | ||||
| Observers needing access to the [F3411-19] web-based Broadcast | ||||
| Authentication Verifier Service or needing to do external lookups. | ||||
| As RID must often operate within these constraints, heavyweight | As RID must often operate within these constraints, heavyweight | |||
| cryptographic security protocols or even simple cryptographic | cryptographic security protocols or even simple cryptographic | |||
| handshakes are infeasible, yet trustworthiness of UAS RID information | handshakes are infeasible, yet trustworthiness of UAS RID information | |||
| is essential. Under [F3411-19], _even the most basic datum, the UAS | is essential. Under [F3411-19], _even the most basic datum, the UAS | |||
| ID itself, can be merely an unsubstantiated claim_. | ID itself, can be merely an unsubstantiated claim_. | |||
| Observer devices being ubiquitous, thus popular targets for malware | Observer devices are ubiquitous; thus, they are popular targets for | |||
| or other compromise, cannot be generally trusted (although the user | malware or other compromise, so they cannot be generally trusted | |||
| of each device is compelled to trust that device, to some extent); a | (although the user of each device is compelled to trust that device, | |||
| "fair witness" functionality (inspired by [Stranger]) is desirable. | to some extent). A "fair witness" functionality (inspired by | |||
| [Stranger]) is desirable. | ||||
| Despite work by regulators and SDOs, there are substantial gaps in | Despite work by regulators and SDOs, there are substantial gaps in | |||
| UAS standards generally and UAS RID specifically. [Roadmap] catalogs | UAS standards generally and UAS RID specifically. [Roadmap] catalogs | |||
| UAS related standards, ongoing standardization activities and gaps | UAS-related standards, ongoing standardization activities, and gaps | |||
| (as of 2020); Section 7.8 catalogs those related specifically to UAS | (as of 2020); Section 7.8 catalogs those related specifically to UAS | |||
| RID. DRIP will address the most fundamental of these gaps, as | RID. DRIP will address the most fundamental of these gaps, as | |||
| foreshadowed above. | foreshadowed above. | |||
| 1.3. DRIP Scope | 1.3. DRIP Scope | |||
| DRIP's initial charter is to make RID immediately actionable, in both | DRIP's initial objective is to make RID immediately actionable, | |||
| Internet and local-only connected scenarios (especially emergencies), | especially in emergencies, in severely constrained UAS environments | |||
| in severely constrained UAS environments, balancing legitimate (e.g., | (both Internet and local-only connected scenarios), balancing | |||
| public safety) authorities' Need To Know trustworthy information with | legitimate (e.g., public safety) authorities' Need To Know | |||
| UAS operators' privacy. By "immediately actionable" is meant | trustworthy information with UAS operators' privacy. The phrase | |||
| information of sufficient precision, accuracy, timeliness, etc. for | "immediately actionable" means information of sufficient precision, | |||
| an Observer to use it as the basis for immediate decisive action, | accuracy, and timeliness for an Observer to use it as the basis for | |||
| whether that be to trigger a defensive counter-UAS system, to attempt | immediate decisive action (e.g., triggering a defensive counter-UAS | |||
| to initiate communications with the UAS operator, to accept the | system, attempting to initiate communications with the UAS operator, | |||
| presence of the UAS in the airspace where/when observed as not | accepting the presence of the UAS in the airspace where/when observed | |||
| requiring further action, or whatever, with potentially severe | as not requiring further action, etc.) with potentially severe | |||
| consequences of any action or inaction chosen based on that | consequences of any action or inaction chosen based on that | |||
| information. For further explanation of the concept of immediate | information. For further explanation of the concept of immediate | |||
| actionability, see [ENISACSIRT]. | actionability, see [ENISACSIRT]. | |||
| Note that UAS RID must achieve nearly universal adoption, but DRIP | Note that UAS RID must achieve nearly universal adoption, but DRIP | |||
| can add value even if only selectively deployed. Authorities with | can add value even if only selectively deployed. Authorities with | |||
| jurisdiction over more sensitive airspace volumes may set a higher | jurisdiction over more sensitive airspace volumes may set a RID | |||
| than generally mandated RID requirement for flight in such volumes. | requirement, for flight in such volumes, that is higher than | |||
| Those with a greater need for high-confidence IFF can equip with | generally mandated. Those with a greater need for high-confidence | |||
| DRIP, enabling strong authentication of their own aircraft and allied | IFF can equip with DRIP, enabling strong authentication of their own | |||
| operators without regard for the weaker (if any) authentication of | aircraft and allied operators without regard for the weaker (if any) | |||
| others. | authentication of others. | |||
| DRIP (originally Trustworthy Multipurpose Remote Identification, TM- | DRIP (originally "Trustworthy Multipurpose Remote Identification (TM- | |||
| RID) potentially could be applied to verifiably identify other types | RID)") could be applied to verifiably identify other types of | |||
| of registered things reported to be in specified physical locations, | registered things reported to be in specified physical locations. | |||
| and providing timely trustworthy identification data is also | Providing timely trustworthy identification data is also prerequisite | |||
| prerequisite to identity-oriented networking, but the urgent | to identity-oriented networking. Despite the value of DRIP to these | |||
| motivation and clear initial focus is UAS. Existing Internet | and other potential applications, UAS RID is the urgent motivation | |||
| resources (protocol standards, services, infrastructure, and business | and clear initial focus of DRIP. Existing Internet resources | |||
| models) should be leveraged. | (protocol standards, services, infrastructure, and business models) | |||
| should be leveraged. | ||||
| 1.4. Document Scope | 1.4. Document Scope | |||
| This document describes the problem space for UAS RID conforming to | This document describes the problem space for UAS RID conforming to | |||
| proposed regulations and external technical standards, defines common | proposed regulations and external technical standards, defines common | |||
| terminology, specifies numbered requirements for DRIP, identifies | terminology, specifies numbered requirements for DRIP, identifies | |||
| some important considerations (IANA, security, privacy and | some important considerations (IANA, security, privacy, and | |||
| transparency), and discusses limitations. | transparency), and discusses limitations. | |||
| A natural Internet-based approach to meet these requirements is | A natural Internet-based approach to meet these requirements is | |||
| described in a companion architecture document [drip-architecture] | described in a companion architecture document [DRIP-ARCH] and | |||
| and elaborated in other DRIP documents. | elaborated in other DRIP documents. | |||
| 2. Terms and Definitions | 2. Terms and Definitions | |||
| 2.1. Requirements Terminology | 2.1. Requirements Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
| "OPTIONAL" in this document are to be interpreted as described in BCP | "OPTIONAL" in this document are to be interpreted as described in | |||
| 14 [RFC2119] [RFC8174] when, and only when, they appear in all | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
| capitals, as shown here. | capitals, as shown here. | |||
| 2.2. Definitions | 2.2. Definitions | |||
| This section defines a non-comprehensive set of terms expected to be | This section defines a non-comprehensive set of terms expected to be | |||
| used in DRIP documents. This list is meant to be the DRIP | used in DRIP documents. This list is meant to be the DRIP | |||
| terminology reference; as such, some of the terms listed below are | terminology reference; as such, some of the terms listed below are | |||
| not used in this document. | not used in this document. | |||
| To encourage comprehension necessary for adoption of DRIP by the | ||||
| intended user community, the UAS community's norms are respected | ||||
| herein, and definitions are quoted in cases where they have been | ||||
| found in that community's documents. Most of the terms listed below | ||||
| are from that community (even if specific source documents are not | ||||
| cited); any terms that are DRIP-specific or defined by this document | ||||
| are marked "(DRIP)". | ||||
| Note that, in the UAS community, the plural form of an acronym, | ||||
| generally, is the same as the singular form, e.g., Unmanned Aircraft | ||||
| System (singular) and Unmanned Aircraft Systems (plural) are both | ||||
| represented as UAS. | ||||
| [RFC4949] provides a glossary of Internet security terms that should | [RFC4949] provides a glossary of Internet security terms that should | |||
| be used where applicable. | be used where applicable. | |||
| In the UAS community, the plural form of acronyms generally is the | ||||
| same as the singular form, e.g., Unmanned Aircraft System (singular) | ||||
| and Unmanned Aircraft Systems (plural) are both represented as UAS. | ||||
| On this and other terminological issues, to encourage comprehension | ||||
| necessary for adoption of DRIP by the intended user community, that | ||||
| community's norms are respected herein, and definitions are quoted in | ||||
| cases where they have been found in that community's documents. Most | ||||
| of the listed terms are from that community (even if specific source | ||||
| documents are not cited); any that are DRIP-specific or invented by | ||||
| the authors of this document are marked "(DRIP)". | ||||
| 4-D | 4-D | |||
| Four-dimensional. Latitude, Longitude, Altitude, Time. Used | Four-dimensional. Latitude, Longitude, Altitude, Time. Used | |||
| especially to delineate an airspace volume in which an operation | especially to delineate an airspace volume in which an operation | |||
| is being or will be conducted. | is being or will be conducted. | |||
| AAA | AAA | |||
| Attestation, Authentication, Authorization, Access Control, | Attestation, Authentication, Authorization, Access Control, | |||
| Accounting, Attribution, Audit, or any subset thereof (uses differ | Accounting, Attribution, Audit, or any subset thereof (uses differ | |||
| by application, author, and context). (DRIP) | by application, author, and context). (DRIP) | |||
| ABDAA | ABDAA | |||
| AirBorne DAA. Accomplished using systems onboard the aircraft | AirBorne DAA. Accomplished using systems onboard the aircraft | |||
| involved. Supports "self-separation" (remaining "well clear" of | involved. Supports "self-separation" (remaining "well clear" of | |||
| other aircraft) and collision avoidance. | other aircraft) and collision avoidance. | |||
| ADS-B | ADS-B | |||
| Automatic Dependent Surveillance - Broadcast. "ADS-B Out" | Automatic Dependent Surveillance - Broadcast. "ADS-B Out" | |||
| equipment obtains aircraft position from other on-board systems | equipment obtains aircraft position from other on-board systems | |||
| (typically GNSS) and periodically broadcasts it to "ADS-B In" | (typically GNSS) and periodically broadcasts it to "ADS-B In" | |||
| equipped entities, including other aircraft, ground stations, and | equipped entities, including other aircraft, ground stations, and | |||
| satellite based monitoring systems. | satellite-based monitoring systems. | |||
| AGL | AGL | |||
| Above Ground Level. Relative altitude, above the variously | Above Ground Level. Relative altitude, above the variously | |||
| defined local ground level, typically of a UA, measured in feet or | defined local ground level, typically of a UA, measured in feet or | |||
| meters. Should be explicitly specified as either barometric | meters. Should be explicitly specified as either barometric | |||
| (pressure) or geodetic (GNSS) altitude. | (pressure) or geodetic (GNSS) altitude. | |||
| ATC | ATC | |||
| Air Traffic Control. Explicit flight direction to pilots from | Air Traffic Control. Explicit flight direction to pilots from | |||
| ground controllers. Contrast with ATM. | ground controllers. Contrast with ATM. | |||
| ATM | ATM | |||
| Air Traffic Management. A broader functional and geographic scope | Air Traffic Management. A broader functional and geographic scope | |||
| and/or a higher layer of abstraction than ATC. "The dynamic, | and/or a higher layer of abstraction than ATC. [ICAOATM] defines | |||
| integrated management of air traffic and airspace including air | ATM as the following: "The dynamic, integrated management of air | |||
| traffic services, airspace management and air traffic flow | traffic and airspace including air traffic services, airspace | |||
| management - safely, economically and efficiently - through the | management and air traffic flow management -- safely, economically | |||
| provision of facilities and seamless services in collaboration | and efficiently -- through the provision of facilities and | |||
| with all parties and involving airborne and ground-based | seamless services in collaboration with all parties and involving | |||
| functions" [ICAOATM]. | airborne and ground-based functions". | |||
| Authentication Message | Authentication Message | |||
| [F3411-19] Message Type 2. Provides framing for authentication | [F3411-19] Message Type 2. Provides framing for authentication | |||
| data, only; the only message that can be extended in length by | data only; the only message that can be extended in length by | |||
| segmenting it across more than one page. | segmenting it across more than one page. | |||
| Basic ID Message | Basic ID Message | |||
| [F3411-19] Message Type 0. Provides UA Type, UAS ID Type (and | [F3411-19] Message Type 0. Provides UA Type, ID Type (and | |||
| Specific Session ID subtype if applicable), and UAS ID, only. | Specific Session ID subtype if applicable), and UAS ID only. | |||
| Broadcast Authentication Verifier Service | Broadcast Authentication Verifier Service | |||
| System component designed to handle any authentication of | System component designed to handle any authentication of | |||
| Broadcast RID by offloading signature verification to a web | Broadcast RID by offloading signature verification to a web | |||
| service [F3411-19]. | service [F3411-19]. | |||
| BVLOS | BVLOS | |||
| Beyond Visual Line Of Sight. See VLOS. | Beyond Visual Line Of Sight. See VLOS. | |||
| byte | byte | |||
| Used here in its now-customary sense as a synonym for "octet", as | Used here in its now-customary sense as a synonym for "octet", as | |||
| "byte" is used exclusively in definitions of data structures | "byte" is used exclusively in definitions of data structures | |||
| specified in [F3411-19] | specified in [F3411-19]. | |||
| CAA | CAA | |||
| Civil Aviation Authority of a regulatory jurisdiction. Often so | Civil Aviation Authority of a regulatory jurisdiction. Often so | |||
| named, but other examples include the United States Federal | named, but other examples include the United States Federal | |||
| Aviation Administration (FAA) and the Japan Civil Aviation Bureau. | Aviation Administration (FAA) and the Japan Civil Aviation Bureau. | |||
| CSWaP | CSWaP | |||
| Cost, Size, Weight, and Power. | Cost, Size, Weight, and Power | |||
| C2 | C2 | |||
| Command and Control. Previously mostly used in military contexts. | Command and Control. Previously mostly used in military contexts. | |||
| Properly refers to a function, exercisable over arbitrary | Properly refers to a function that is exercisable over arbitrary | |||
| communications; but in the small UAS context, often refers to the | communications, but in the small UAS context, often refers to the | |||
| communications (typically RF data link) over which the GCS | communications (typically RF data link) over which the GCS | |||
| controls the UA. | controls the UA. | |||
| DAA | DAA | |||
| Detect And Avoid, formerly Sense And Avoid (SAA). A means of | Detect And Avoid, formerly "Sense And Avoid (SAA)". A means of | |||
| keeping aircraft "well clear" of each other and obstacles for | keeping aircraft "well clear" of each other and obstacles for | |||
| safety. "The capability to see, sense or detect conflicting | safety. [ICAOUAS] defines DAA as the following: "The capability | |||
| traffic or other hazards and take the appropriate action to comply | to see, sense or detect conflicting traffic or other hazards and | |||
| with the applicable rules of flight" [ICAOUAS]. | take the appropriate action to comply with the applicable rules of | |||
| flight". | ||||
| DRI (not to be confused with DRIP) | DRI (not to be confused with DRIP) | |||
| Direct Remote Identification. EU regulatory requirement for "a | Direct Remote Identification. EU regulatory requirement for "a | |||
| system that ensures the local broadcast of information about a UA | system that ensures the local broadcast of information about a UA | |||
| in operation, including the marking of the UA, so that this | in operation, including the marking of the UA, so that this | |||
| information can be obtained without physical access to the UA". | information can be obtained without physical access to the UA" | |||
| [Delegated] that presumably can be satisfied with appropriately | [Delegated]. This requirement can presumably be satisfied with | |||
| configured [F3411-19] Broadcast RID. | appropriately configured [F3411-19] Broadcast RID. | |||
| DSS | DSS | |||
| Discovery and Synchronization Service. The UTM system overlay | Discovery and Synchronization Service. The UTM system overlay | |||
| network backbone. Most importantly, it enables one USS to learn | network backbone. Most importantly, it enables one USS to learn | |||
| which other USS have UAS operating in a given 4-D airspace volume, | which other USS have UAS operating in a given 4-D airspace volume, | |||
| for strategic deconfliction of planned operations and Network RID | for strategic deconfliction of planned operations and Network RID | |||
| surveillance of active operations. [F3411-19] | surveillance of active operations. See [F3411-19]. | |||
| EUROCAE | EUROCAE | |||
| European Organisation for Civil Aviation Equipment. Aviation SDO, | European Organisation for Civil Aviation Equipment. Aviation SDO, | |||
| originally European, now with broader membership. Cooperates | originally European, now with broader membership. Cooperates | |||
| extensively with RTCA. | extensively with RTCA. | |||
| GBDAA | GBDAA | |||
| Ground Based DAA. Accomplished with the aid of ground based | Ground-Based DAA. Accomplished with the aid of ground-based | |||
| functions. | functions. | |||
| GCS | GCS | |||
| Ground Control Station. The part of the UAS that the remote pilot | Ground Control Station. The part of the UAS that the Remote Pilot | |||
| uses to exercise C2 over the UA, whether by remotely exercising UA | uses to exercise C2 over the UA, whether by remotely exercising UA | |||
| flight controls to fly the UA, by setting GNSS waypoints, or | flight controls to fly the UA, by setting GNSS waypoints, or by | |||
| otherwise directing its flight. | otherwise directing its flight. | |||
| GNSS | GNSS | |||
| Global Navigation Satellite System. Satellite based timing and/or | Global Navigation Satellite System. Satellite-based timing and/or | |||
| positioning with global coverage, often used to support | positioning with global coverage, often used to support | |||
| navigation. | navigation. | |||
| GPS | GPS | |||
| Global Positioning System. A specific GNSS, but in the UAS | Global Positioning System. A specific GNSS, but in the UAS | |||
| context, the term is typically misused in place of the more | context, the term is typically misused in place of the more | |||
| generic term GNSS. | generic term "GNSS". | |||
| GRAIN | GRAIN | |||
| Global Resilient Aviation Interoperable Network. ICAO managed | Global Resilient Aviation Interoperable Network. ICAO-managed | |||
| IPv6 overlay internetwork based on IATF, dedicated to aviation | IPv6 overlay internetwork based on IATF that is dedicated to | |||
| (but not just aircraft). Currently (2021) in design, | aviation (but not just aircraft). As currently (2021) designed, | |||
| accommodating the proposed DRIP identifier. | it accommodates the proposed DRIP identifier. | |||
| IATF | IATF | |||
| International Aviation Trust Framework. ICAO effort to develop a | International Aviation Trust Framework. ICAO effort to develop a | |||
| resilient and secure by design framework for networking in support | resilient and secure by design framework for networking in support | |||
| of all aspects of aviation. | of all aspects of aviation. | |||
| ICAO | ICAO | |||
| International Civil Aviation Organization. A United Nations | International Civil Aviation Organization. A specialized agency | |||
| specialized agency that develops and harmonizes international | of the United Nations that develops and harmonizes international | |||
| standards relating to aviation. | standards relating to aviation. | |||
| IFF | IFF | |||
| Identification Friend or Foe. Originally, and in its narrow sense | Identification Friend or Foe. Originally, and in its narrow sense | |||
| still, a self-identification broadcast in response to | still, a self-identification broadcast in response to | |||
| interrogation via radar, to reduce friendly fire incidents, which | interrogation via radar to reduce friendly fire incidents, which | |||
| led to military and commercial transponder systems such as ADS-B. | led to military and commercial transponder systems such as ADS-B. | |||
| In the broader sense used here, any process intended to | In the broader sense used here, any process intended to | |||
| distinguish friendly from potentially hostile UA or other entities | distinguish friendly from potentially hostile UA or other entities | |||
| encountered. | encountered. | |||
| LAANC | LAANC | |||
| Low Altitude Authorization and Notification Capability. Supports | Low Altitude Authorization and Notification Capability. Supports | |||
| ATC authorization requirements for UAS operations: remote pilots | ATC authorization requirements for UAS operations: Remote Pilots | |||
| can apply to receive a near real-time authorization for operations | can apply to receive a near real-time authorization for operations | |||
| under 400 feet in controlled airspace near airports. FAA | under 400 feet in controlled airspace near airports. FAA- | |||
| authorized partial stopgap in the US until UTM comes. | authorized partial stopgap in the US until UTM comes. | |||
| Location/Vector Message | Location/Vector Message | |||
| [F3411-19] Message Type 1. Provides UA location, altitude, | [F3411-19] Message Type 1. Provides UA location, altitude, | |||
| heading, speed, and status. | heading, speed, and status. | |||
| LOS | LOS | |||
| Line Of Sight. An adjectival phrase describing any information | Line Of Sight. An adjectival phrase describing any information | |||
| transfer that travels in a nearly straight line (e.g., | transfer that travels in a nearly straight line (e.g., | |||
| electromagnetic energy, whether in the visual light, RF, or other | electromagnetic energy, whether in the visual light, RF, or other | |||
| skipping to change at page 16, line 7 ¶ | skipping to change at line 757 ¶ | |||
| Message Pack | Message Pack | |||
| [F3411-19] Message Type 15. The framed concatenation, in message | [F3411-19] Message Type 15. The framed concatenation, in message | |||
| type index order, of at most one message of each type of any | type index order, of at most one message of each type of any | |||
| subset of the other types. Required to be sent in Wi-Fi NAN and | subset of the other types. Required to be sent in Wi-Fi NAN and | |||
| in Bluetooth 5 Extended Advertisements, if those media are used; | in Bluetooth 5 Extended Advertisements, if those media are used; | |||
| cannot be sent in Bluetooth 4. | cannot be sent in Bluetooth 4. | |||
| MSL | MSL | |||
| Mean Sea Level. Shorthand for relative altitude, above the | Mean Sea Level. Shorthand for relative altitude, above the | |||
| variously defined mean sea level, typically of a UA (but in [FRUR] | variously defined mean sea level, typically of a UA (but in | |||
| also for a GCS), measured in feet or meters. Should be explicitly | [FRUR], also for a GCS), measured in feet or meters. Should be | |||
| specified as either barometric (pressure) or geodetic (e.g., as | explicitly specified as either barometric (pressure) or geodetic | |||
| indicated by GNSS, referenced to the WGS84 ellipsoid). | (e.g., as indicated by GNSS, referenced to the WGS84 ellipsoid). | |||
| Net-RID DP | Net-RID DP | |||
| Network RID Display Provider. [F3411-19] logical entity that | Network RID Display Provider. [F3411-19] logical entity that | |||
| aggregates data from Net-RID SPs as needed in response to user | aggregates data from Net-RID SPs as needed in response to user | |||
| queries regarding UAS operating within specified airspace volumes, | queries regarding UAS operating within specified airspace volumes | |||
| to enable display by a user application on a user device. | to enable display by a user application on a user device. | |||
| Potentially could provide not only information sent via UAS RID | Potentially could provide not only information sent via UAS RID | |||
| but also information retrieved from UAS RID registries or | but also information retrieved from UAS RID registries or | |||
| information beyond UAS RID. Under superseded [NPRM], not | information beyond UAS RID. Under superseded [NPRM], not | |||
| recognized as a distinct entity, but a service provided by USS, | recognized as a distinct entity, but as a service provided by USS, | |||
| including Public Safety USS that may exist primarily for this | including public safety USS that may exist primarily for this | |||
| purpose rather than to manage any subscribed UAS. | purpose rather than to manage any subscribed UAS. | |||
| Net-RID SP | Net-RID SP | |||
| Network RID Service Provider. [F3411-19] logical entity that | Network RID Service Provider. [F3411-19] logical entity that | |||
| collects RID messages from UAS and responds to NetRID-DP queries | collects RID messages from UAS and responds to Net-RID DP queries | |||
| for information on UAS of which it is aware. Under superseded | for information on UAS of which it is aware. Under superseded | |||
| [NPRM], the USS to which the UAS is subscribed ("Remote ID USS"). | [NPRM], the USS to which the UAS is subscribed (i.e., the "Remote | |||
| ID USS"). | ||||
| Network Identification Service | Network Identification Service | |||
| EU regulatory requirement in [Opinion1] and [WG105] that | EU regulatory requirement in [Opinion1], corresponding to the | |||
| presumably can be satisfied with appropriately configured | Electronic Identification for which Minimum Operational | |||
| [F3411-19] Network RID. | Performance Standards are specified in [WG105], which presumably | |||
| can be satisfied with appropriately configured [F3411-19] Network | ||||
| RID. | ||||
| Observer | Observer | |||
| An entity (typically but not necessarily an individual human) who | An entity (typically, but not necessarily, an individual human) | |||
| has directly or indirectly observed a UA and wishes to know | who has directly or indirectly observed a UA and wishes to know | |||
| something about it, starting with its ID. An Observer typically | something about it, starting with its ID. An Observer typically | |||
| is on the ground and local (within VLOS of an observed UA), but | is on the ground and local (within VLOS of an observed UA), but | |||
| could be remote (observing via Network RID or other surveillance), | could be remote (observing via Network RID or other surveillance), | |||
| operating another UA, aboard another aircraft, etc. (DRIP) | operating another UA, aboard another aircraft, etc. (DRIP) | |||
| Operation | Operation | |||
| A flight, or series of flights of the same mission, by the same | A flight, or series of flights of the same mission, by the same | |||
| UAS, separated by at most brief ground intervals. (Inferred from | UAS, separated by, at most, brief ground intervals. (Inferred | |||
| UTM usage, no formal definition found) | from UTM usage; no formal definition found.) | |||
| Operator | Operator | |||
| "A person, organization or enterprise engaged in or offering to | "A person, organization or enterprise engaged in or offering to | |||
| engage in an aircraft operation" [ICAOUAS]. | engage in an aircraft operation" [ICAOUAS]. | |||
| Operator ID Message | Operator ID Message | |||
| [F3411-19] Message Type 5. Provides CAA issued Operator ID, only. | [F3411-19] Message Type 5. Provides CAA-issued Operator ID only. | |||
| Operator ID is distinct from UAS ID. | Operator ID is distinct from UAS ID. | |||
| page | page | |||
| Payload of a frame, containing a chunk of a message that has been | Payload of a frame, containing a chunk of a message that has been | |||
| segmented, to allow transport of a message longer than can be | segmented, that allows transport of a message longer than can be | |||
| encapsulated in a single frame. [F3411-19] | encapsulated in a single frame. See [F3411-19]. | |||
| PIC | PIC | |||
| Pilot In Command. "The pilot designated by the operator, or in | Pilot In Command. "The pilot designated by the operator, or in | |||
| the case of general aviation, the owner, as being in command and | the case of general aviation, the owner, as being in command and | |||
| charged with the safe conduct of a flight" [ICAOUAS]. | charged with the safe conduct of a flight" [ICAOUAS]. | |||
| PII | PII | |||
| Personally Identifiable Information. In the UAS RID context, | Personally Identifiable Information. In the UAS RID context, | |||
| typically of the UAS Operator, Pilot In Command (PIC), or Remote | typically of the UAS Operator, PIC, or Remote Pilot, but possibly | |||
| Pilot, but possibly of an Observer or other party. This specific | of an Observer or other party. This specific term is used | |||
| term is used primarily in the US; other terms with essentially the | primarily in the US; other terms with essentially the same meaning | |||
| same meaning are more common in other jurisdictions (e.g., | are more common in other jurisdictions (e.g., "personal data" in | |||
| "personal data" in the EU). Used herein generically to refer to | the EU). Used herein generically to refer to personal information | |||
| personal information, which the person might wish to keep private, | that the person might wish to keep private or may have a | |||
| or may have a statutorily recognized right to keep private (e.g., | statutorily recognized right to keep private (e.g., under the EU | |||
| under the EU [GDPR]), potentially imposing (legally or ethically) | [GDPR]), potentially imposing (legally or ethically) a | |||
| a confidentiality requirement on protocols/systems. | confidentiality requirement on protocols/systems. | |||
| Remote Pilot | Remote Pilot | |||
| A pilot using a GCS to exercise proximate control of a UA. Either | A pilot using a GCS to exercise proximate control of a UA. Either | |||
| the PIC or under the supervision of the PIC. "The person who | the PIC or under the supervision of the PIC. "The person who | |||
| manipulates the flight controls of a remotely-piloted aircraft | manipulates the flight controls of a remotely-piloted aircraft | |||
| during flight time" [ICAOUAS]. | during flight time" [ICAOUAS]. | |||
| RF | RF | |||
| Radio Frequency. Adjective, e.g., "RF link", or noun. | Radio Frequency. Can be used as an adjective (e.g., "RF link") or | |||
| as a noun. | ||||
| RF LOS | RF LOS | |||
| RF Line Of Sight. Typically used in describing a direct radio | RF Line Of Sight. Typically used in describing a direct radio | |||
| link between a GCS and the UA under its control, potentially | link between a GCS and the UA under its control, potentially | |||
| subject to blockage by foliage, structures, terrain, or other | subject to blockage by foliage, structures, terrain, or other | |||
| vehicles, but less so than VLOS. | vehicles, but less so than VLOS. | |||
| RTCA | RTCA | |||
| Radio Technical Commission for Aeronautics. US aviation SDO. | Radio Technical Commission for Aeronautics. US aviation SDO. | |||
| Cooperates extensively with EUROCAE. | Cooperates extensively with EUROCAE. | |||
| Safety | Safety | |||
| "The state in which risks associated with aviation activities, | "The state in which risks associated with aviation activities, | |||
| related to, or in direct support of the operation of aircraft, are | related to, or in direct support of the operation of aircraft, are | |||
| reduced and controlled to an acceptable level." From Annex 19 of | reduced and controlled to an acceptable level" (from Annex 19 of | |||
| the Chicago Convention, quoted in [ICAODEFS] | the Chicago Convention, quoted in [ICAODEFS]). | |||
| Security | Security | |||
| "Safeguarding civil aviation against acts of unlawful | "Safeguarding civil aviation against acts of unlawful | |||
| interference." From Annex 17 of the Chicago Convention, quoted in | interference" (from Annex 17 of the Chicago Convention, quoted in | |||
| [ICAODEFS] | [ICAODEFS]). | |||
| Self-ID Message | Self-ID Message | |||
| [F3411-19] Message Type 3. Provides a 1 byte descriptor and 23 | [F3411-19] Message Type 3. Provides a 1-byte descriptor and | |||
| byte ASCII free text field, only. Expected to be used to provide | 23-byte ASCII free text field, only. Expected to be used to | |||
| context on the operation, e.g., mission intent. | provide context on the operation, e.g., mission intent. | |||
| SDO | SDO | |||
| Standards Development Organization. ASTM, IETF, et al. | Standards Development Organization, such as ASTM, IETF, etc. | |||
| SDSP | SDSP | |||
| Supplemental Data Service Provider. An entity that participates | Supplemental Data Service Provider. An entity that participates | |||
| in the UTM system, but provides services beyond those specified as | in the UTM system but provides services (e.g., weather data) | |||
| basic UTM system functions (e.g., weather data). [FAACONOPS] | beyond those specified as basic UTM system functions. See | |||
| [FAACONOPS]. | ||||
| System Message | System Message | |||
| [F3411-19] Message Type 4. Provides general UAS information, | [F3411-19] Message Type 4. Provides general UAS information, | |||
| including remote pilot location, multiple UA group operational | including Remote Pilot location, multiple UA group operational | |||
| area, etc. | area, etc. | |||
| U-space | U-space | |||
| EU concept and emerging framework for integration of UAS into all | EU concept and emerging framework for integration of UAS into all | |||
| classes of airspace, specifically including high density urban | types of airspace, including but not limited to volumes that are | |||
| areas, sharing airspace with manned aircraft [InitialView]. | in high-density urban areas and/or shared with manned aircraft | |||
| [InitialView]. | ||||
| UA | UA | |||
| Unmanned Aircraft. In popular parlance, "drone". "An aircraft | Unmanned Aircraft. In popular parlance, "drone". "An aircraft | |||
| which is intended to operate with no pilot on board" [ICAOUAS]. | which is intended to operate with no pilot on board" [ICAOUAS]. | |||
| UAS | UAS | |||
| Unmanned Aircraft System. Composed of UA, all required on-board | Unmanned Aircraft System. Composed of UA, all required on-board | |||
| subsystems, payload, control station, other required off-board | subsystems, payload, control station, other required off-board | |||
| subsystems, any required launch and recovery equipment, all | subsystems, any required launch and recovery equipment, all | |||
| required crew members, and C2 links between UA and control station | required crew members, and C2 links between UA and control station | |||
| [F3411-19]. | [F3411-19]. | |||
| UAS ID | UAS ID | |||
| UAS identifier. Although called "UAS ID", it is actually unique | UAS identifier. Although called "UAS ID", it is actually unique | |||
| to the UA, neither to the operator (as some UAS registration | to the UA, neither to the operator (as some UAS registration | |||
| numbers have been and for exclusively recreational purposes are | numbers have been and for exclusively recreational purposes are | |||
| continuing to be assigned), nor to the combination of GCS and UA | continuing to be assigned), nor to the combination of GCS and UA | |||
| that comprise the UAS. _Maximum length of 20 bytes_ [F3411-19]. | that comprise the UAS. _Maximum length of 20 bytes_ [F3411-19]. | |||
| If the UAS ID Type is 4, the proposed Specific Session ID, then | If the ID Type is 4, the proposed Specific Session ID, then the 20 | |||
| the 20 bytes includes the subtype index, leaving only 19 bytes for | bytes includes the subtype index, leaving only 19 bytes for the | |||
| the actual identifier. | actual identifier. | |||
| UAS ID Type | ID Type | |||
| UAS Identifier type index. 4 bits, see Section 3, Paragraph 6 for | UAS identifier type index. 4 bits. See Section 3, Paragraph 6 for | |||
| currently defined values 0-3. [F3411-19] | current standard values 0-3 and currently proposed additional | |||
| value 4. See also [F3411-19]. | ||||
| UAS RID | UAS RID | |||
| UAS Remote Identification and tracking. System to enable | UAS Remote Identification and tracking. System to enable | |||
| arbitrary Observers to identify UA during flight. | arbitrary Observers to identify UA during flight. | |||
| USS | USS | |||
| UAS Service Supplier. "A USS is an entity that assists UAS | UAS Service Supplier. "A USS is an entity that assists UAS | |||
| Operators with meeting UTM operational requirements that enable | Operators with meeting UTM operational requirements that enable | |||
| safe and efficient use of airspace" and "... provide services to | safe and efficient use of airspace" [FAACONOPS]. In addition, | |||
| support the UAS community, to connect Operators and other entities | "USSs provide services to support the UAS community, to connect | |||
| to enable information flow across the USS Network, and to promote | Operators and other entities to enable information flow across the | |||
| shared situational awareness among UTM participants" [FAACONOPS]. | USS Network, and to promote shared situational awareness among UTM | |||
| participants" [FAACONOPS]. | ||||
| UTM | UTM | |||
| UAS Traffic Management. "A specific aspect of air traffic | UAS Traffic Management. "A specific aspect of air traffic | |||
| management which manages UAS operations safely, economically and | management which manages UAS operations safely, economically and | |||
| efficiently through the provision of facilities and a seamless set | efficiently through the provision of facilities and a seamless set | |||
| of services in collaboration with all parties and involving | of services in collaboration with all parties and involving | |||
| airborne and ground-based functions" [ICAOUTM]. In the US, | airborne and ground-based functions" [ICAOUTM]. In the US, | |||
| according to the FAA, a "traffic management" ecosystem for | according to the FAA, a "traffic management" ecosystem for | |||
| "uncontrolled" low altitude UAS operations, separate from, but | "uncontrolled" UAS operations at low altitudes, separate from, but | |||
| complementary to, the FAA's ATC system for "controlled" operations | complementary to, the FAA's ATC system for "controlled" operations | |||
| of manned aircraft. | of manned aircraft. | |||
| V2V | V2V | |||
| Vehicle-to-Vehicle. Originally communications between | Vehicle-to-Vehicle. Originally communications between | |||
| automobiles, now extended to apply to communications between | automobiles, now extended to apply to communications between | |||
| vehicles generally. Often, together with Vehicle-to- | vehicles generally. Often, together with Vehicle-to- | |||
| Infrastructure (V2I) etc., generalized to V2X. | Infrastructure (V2I) and similar functions, generalized to V2X. | |||
| VLOS | VLOS | |||
| Visual Line Of Sight. Typically used in describing operation of a | Visual Line Of Sight. Typically used in describing operation of a | |||
| UA by a "remote" pilot who can clearly directly (without video | UA by a "remote" pilot who can clearly and directly (without video | |||
| cameras or any aids other than glasses or under some rules | cameras or any aids other than glasses or, under some rules, | |||
| binoculars) see the UA and its immediate flight environment. | binoculars) see the UA and its immediate flight environment. | |||
| Potentially subject to blockage by foliage, structures, terrain, | Potentially subject to blockage by foliage, structures, terrain, | |||
| or other vehicles, more so than RF LOS. | or other vehicles, more so than RF LOS. | |||
| 3. UAS RID Problem Space | 3. UAS RID Problem Space | |||
| CAAs worldwide are mandating UAS RID. The European Union Aviation | CAAs worldwide are mandating UAS RID. The European Union Aviation | |||
| Safety Agency (EASA) has published [Delegated] and [Implementing] | Safety Agency (EASA) has published [Delegated] and [Implementing] | |||
| Regulations. The US FAA has published a "final" rule [FRUR] and has | regulations. The US FAA has published a "final" rule [FRUR] and has | |||
| described the key role that UAS RID plays in UAS Traffic Management | described the key role that UAS RID plays in UAS Traffic Management | |||
| (UTM) in [FAACONOPS] (especially Section 2.6). CAAs currently (2021) | (UTM) in [FAACONOPS] (especially Section 2.6). At the time of | |||
| promulgate performance-based regulations that do not specify | writing, CAAs promulgate performance-based regulations that do not | |||
| techniques, but rather cite industry consensus technical standards as | specify techniques but rather cite industry consensus technical | |||
| acceptable means of compliance. | standards as acceptable means of compliance. | |||
| The most widely cited such industry consensus technical standard for | The most widely cited such industry consensus technical standard for | |||
| UAS RID is [F3411-19], which defines two means of UAS RID: | UAS RID is [F3411-19], which defines two means of UAS RID: | |||
| Network RID defines a set of information for UAS to make available | * Network RID defines a set of information for UAS to make available | |||
| globally indirectly via the Internet, through servers that can be | globally indirectly via the Internet, through servers that can be | |||
| queried by Observers. | queried by Observers. | |||
| Broadcast RID defines a set of messages for UA to transmit locally | * Broadcast RID defines a set of messages for UA to transmit locally | |||
| directly one-way over Bluetooth or Wi-Fi (without IP or any other | directly one-way over Bluetooth or Wi-Fi (without IP or any other | |||
| protocols between the data link and application layers), to be | protocols between the data link and application layers), to be | |||
| received in real time by local Observers. | received in real time by local Observers. | |||
| UAS using both means must send the same UAS RID application layer | UAS using both means must send the same UAS RID application-layer | |||
| information via each [F3411-19]. The presentation may differ, as | information via each [F3411-19]. The presentation may differ, as | |||
| Network RID defines a data dictionary, whereas Broadcast RID defines | Network RID defines a data dictionary, whereas Broadcast RID defines | |||
| message formats (which carry items from that same data dictionary). | message formats (which carry items from that same data dictionary). | |||
| The interval (or rate) at which it is sent may differ, as Network RID | The interval (or rate) at which it is sent may differ, as Network RID | |||
| can accommodate Observer queries asynchronous to UAS updates (which | can accommodate Observer queries asynchronous to UAS updates (which | |||
| generally need be sent only when information, such as location, | generally need be sent only when information, such as location, | |||
| changes), whereas Broadcast RID depends upon Observers receiving UA | changes), whereas Broadcast RID depends upon Observers receiving UA | |||
| messages at the time they are transmitted. | messages at the time they are transmitted. | |||
| Network RID depends upon Internet connectivity in several segments | Network RID depends upon Internet connectivity in several segments | |||
| from the UAS to each Observer. Broadcast RID should need Internet | from the UAS to each Observer. Broadcast RID should need Internet | |||
| (or other Wide Area Network) connectivity only to retrieve UAS | (or other Wide Area Network) connectivity only to retrieve registry | |||
| registry information using the directly locally received UAS | information, using, as the primary unique key for database lookup, | |||
| Identifier (UAS ID) as the primary unique key for database lookup. | the UAS Identifier (UAS ID) that was directly locally received. | |||
| Broadcast RID does not assume IP connectivity of UAS; messages are | Broadcast RID does not assume IP connectivity of UAS; messages are | |||
| encapsulated by the UA _without IP_, directly in link layer frames | encapsulated by the UA _without IP_, directly in link-layer frames | |||
| (Bluetooth 4, Bluetooth 5, Wi-Fi NAN, IEEE 802.11 Beacon, or in the | (Bluetooth 4, Bluetooth 5, Wi-Fi NAN, IEEE 802.11 Beacon, or perhaps | |||
| future perhaps others). | others in the future). | |||
| [F3411-19] specifies three UAS ID Type values and its currently | [F3411-19] specifies three ID Type values, and its proposed revision | |||
| (August 2021) proposed revision adds a fourth: | (at the time of writing) adds a fourth: | |||
| 1 A static, manufacturer assigned, hardware serial number as defined | 1 A static, manufacturer-assigned, hardware serial number as defined | |||
| in ANSI/CTA-2063-A "Small Unmanned Aerial System Serial Numbers" | in "Small Unmanned Aerial Systems Serial Numbers" [CTA2063A]. | |||
| [CTA2063A]. | ||||
| 2 A CAA assigned (generally static) ID, like the registration number | 2 A CAA-assigned (generally static) ID, like the registration number | |||
| of a manned aircraft. | of a manned aircraft. | |||
| 3 A UTM system assigned UUID [RFC4122], which can but need not be | 3 A UTM-system-assigned Universally Unique Identifier (UUID) | |||
| dynamic. | [RFC4122], which can but need not be dynamic. | |||
| 4 A Specific Session ID, of any of an 8 bit range of subtypes | 4 A Specific Session ID, of any of an 8-bit range of subtypes | |||
| defined external to ASTM and registered with ICAO, for which | defined external to ASTM and registered with ICAO, for which | |||
| subtype 1 has been reserved by ASTM for the DRIP entity ID. | subtype 1 has been reserved by ASTM for the DRIP entity ID. | |||
| Per [Delegated], the EU allows only UAS ID Type 1. Under [FRUR], the | Per [Delegated], the EU allows only ID Type 1. Under [FRUR], the US | |||
| US allows types 1 and 3. [NPRM] proposed that a type 3 "Session ID" | allows ID Type 1 and ID Type 3. [NPRM] proposed that a "Session ID" | |||
| would be "e.g., a randomly-generated alphanumeric code assigned by a | would be "e.g., a randomly-generated alphanumeric code assigned by a | |||
| Remote ID UAS Service Supplier (USS) on a per-flight basis designed | Remote ID UAS Service Supplier (USS) on a per-flight basis designed | |||
| to provide additional privacy to the operator", but given the | to provide additional privacy to the operator", but given the | |||
| omission of Network RID from [FRUR], how this is to be assigned in | omission of Network RID from [FRUR], how this is to be assigned in | |||
| the US is still to be determined. | the US is still to be determined. | |||
| As yet apparently there are no CAA public proposals to use UAS ID | As yet, there are apparently no CAA public proposals to use ID Type | |||
| Type 2. In the preamble of [FRUR], the FAA argues that registration | 2. In the preamble of [FRUR], the FAA argues that registration | |||
| numbers should not be sent in RID, insists that the capability of | numbers should not be sent in RID, insists that the capability of | |||
| looking up registration numbers from information contained in RID | looking up registration numbers from information contained in RID | |||
| should be restricted to FAA and other Government agencies, and | should be restricted to FAA and other Government agencies, and | |||
| implies that Session ID would be linked to the registration number | implies that Session ID would be linked to the registration number | |||
| only indirectly via the serial number in the registration database. | only indirectly via the serial number in the registration database. | |||
| The possibility of cryptographically blinding registration numbers, | The possibility of cryptographically blinding registration numbers, | |||
| such that they can be revealed under specified circumstances, does | such that they can be revealed under specified circumstances, does | |||
| not appear to be mentioned in applicable regulations or external | not appear to be mentioned in applicable regulations or external | |||
| technical standards. | technical standards. | |||
| Under [Delegated], the EU also requires an operator registration | Per [Delegated], the EU also requires an operator registration number | |||
| number (an additional identifier distinct from the UAS ID) that can | (an additional identifier distinct from the UAS ID) that can be | |||
| be carried in an [F3411-19] optional Operator ID message. | carried in an [F3411-19] optional Operator ID Message. | |||
| [FRUR] allows RID requirements to be met by either the UA itself, | [FRUR] allows RID requirements to be met either by the UA itself, | |||
| which is then designated a "standard remote identification unmanned | which is then designated a "standard remote identification unmanned | |||
| aircraft", or by an add-on "remote identification broadcast module". | aircraft", or by an add-on "remote identification broadcast module". | |||
| Relative to a standard RID UA, the different requirements for a | The requirements for a module are different than for a standard RID | |||
| module are that the latter: must transmit its own serial number | UA. The module: | |||
| (neither the serial number of the UA to which it is attached, nor a | ||||
| Session ID); must transmit takeoff location as a proxy for the | * must transmit its own serial number (neither the serial number of | |||
| location of the pilot/GCS; need not transmit UA emergency status; and | the UA to which it is attached, nor a Session ID), | |||
| is allowed to be used only for operations within VLOS of the remote | ||||
| pilot. | * must transmit takeoff location as a proxy for the location of the | |||
| pilot/GCS, | ||||
| * need not transmit UA emergency status, and | ||||
| * is allowed to be used only for operations within VLOS of the | ||||
| Remote Pilot. | ||||
| Jurisdictions may relax or waive RID requirements for certain | Jurisdictions may relax or waive RID requirements for certain | |||
| operators and/or under certain conditions. For example, [FRUR] | operators and/or under certain conditions. For example, [FRUR] | |||
| allows operators with UAS not equipped for RID to conduct VLOS | allows operators with UAS not equipped for RID to conduct VLOS | |||
| operations at counter-intuitively named "FAA-recognized | operations at counterintuitively named "FAA-Recognized Identification | |||
| identification areas" (FRIA); radio controlled model aircraft flying | Areas (FRIAs)"; radio-controlled model aircraft flying clubs and | |||
| clubs and other eligible organizations can apply to the FAA for such | other eligible organizations can apply to the FAA for such | |||
| recognition of their operating areas. | recognition of their operating areas. | |||
| 3.1. Network RID | 3.1. Network RID | |||
| Figure 3 illustrates Network RID information flows. Only two of the | ||||
| three typically wireless links shown involving the UAS (UA-GCS, UA- | ||||
| Internet, and GCS-Internet) need exist to support C2 and Network RID. | ||||
| All three may exist, at the same or different times, especially in | ||||
| BVLOS operations. There must be at least one information flow path | ||||
| (direct or indirect) between the GCS and the UA, for the former to | ||||
| exercise C2 over the latter. If this path is two-way (as | ||||
| increasingly it is, even for inexpensive small UAS), the UA will also | ||||
| send its status (and position, if suitably equipped, e.g., with GNSS) | ||||
| to the GCS. There also must be a path between at least one subsystem | ||||
| of the UAS (UA or GCS) and the Internet, for the former to send | ||||
| status and position updates to its USS (serving inter alia as a Net- | ||||
| RID SP). | ||||
| +-------------+ ****************** | +-------------+ ****************** | |||
| | UA | * Internet * | | UA | * Internet * | |||
| +--o-------o--+ * * | +--o-------o--+ * * | |||
| | | * * | | | * * | |||
| | | * * +------------+ | | | * * +------------+ | |||
| | '--------*--(+)-----------*-----o | | | '--------*--(+)-----------*-----o | | |||
| | * | * | | | | * | * | | | |||
| | .--------*--(+)-----------*-----o NET-Rid SP | | | .--------*--(+)-----------*-----o Net-RID SP | | |||
| | | * * | | | | | * * | | | |||
| | | * .------*-----o | | | | * .------*-----o | | |||
| | | * | * +------------+ | | | * | * +------------+ | |||
| | | * | * | | | * | * | |||
| | | * | * +------------+ | | | * | * +------------+ | |||
| | | * '------*-----o | | | | * '------*-----o | | |||
| | | * * | NET-Rid DP | | | | * * | Net-RID DP | | |||
| | | * .------*-----o | | | | * .------*-----o | | |||
| | | * | * +------------+ | | | * | * +------------+ | |||
| | | * | * | | | * | * | |||
| | | * | * +------------+ | | | * | * +------------+ | |||
| +--o-------o--+ * '------*-----o Observer's | | +--o-------o--+ * '------*-----o Observer's | | |||
| | GCS | * * | Device | | | GCS | * * | Device | | |||
| +-------------+ ****************** +------------+ | +-------------+ ****************** +------------+ | |||
| Figure 3: "Network RID Information Flow" | Figure 3: Network RID Information Flow | |||
| Figure 3 illustrates Network RID information flows. Only two of the | ||||
| three typically wireless links shown involving the UAS (UA-GCS, UA- | ||||
| Internet, and GCS-Internet) need exist to support C2 and Network RID. | ||||
| All three may exist, at the same or different times, especially in | ||||
| BVLOS operations. There must be some information flow path (direct | ||||
| or indirect) between the GCS and the UA, for the former to exercise | ||||
| C2 over the latter. If this path is two-way (as increasingly it is, | ||||
| even for inexpensive small UAS), the UA will also send its status | ||||
| (and position, if suitably equipped, e.g., with GNSS) to the GCS. | ||||
| There also must be some path between at least one subsystem of the | ||||
| UAS (UA or GCS) and the Internet, for the former to send status and | ||||
| position updates to its USS (serving _inter alia_ as a Net-RID SP). | ||||
| Direct UA-Internet wireless links are expected to become more common, | Direct UA-Internet wireless links are expected to become more common, | |||
| especially on larger UAS, but currently (2021) are rare. Instead, | especially on larger UAS, but, at the time of writing, they are rare. | |||
| the RID data flow typically originates on the UA and passes through | Instead, the RID data flow typically originates on the UA and passes | |||
| the GCS, or originates on the GCS. Network RID data makes three | through the GCS, or it originates on the GCS. Network RID data makes | |||
| trips through the Internet (GCS-SP, SP-DP, DP-Observer, unless any of | three trips through the Internet (GCS-SP, SP-DP, DP-Observer, unless | |||
| them are colocated), implying use of IP (and other middle layer | any of them are colocated), implying use of IP (and other middle- | |||
| protocols, e.g., TLS/TCP or DTLS/UDP) on those trips. IP is not | layer protocols, e.g., TLS/TCP or DTLS/UDP) on those trips. IP is | |||
| necessarily used or supported on the UA-GCS link (if indeed that | not necessarily used or supported on the UA-GCS link (if indeed that | |||
| direct link exists, as it typically does now, but in BVLOS operations | direct link exists, as it typically does now, but in BVLOS operations | |||
| often will not). | often will not). | |||
| Network RID is publish-subscribe-query. In the UTM context: | Network RID is publish-subscribe-query. In the UTM context: | |||
| 1. The UAS operator pushes an "operational intent" (the current term | 1. The UAS operator pushes an "operational intent" (the current term | |||
| in UTM corresponding to a flight plan in manned aviation) to the | in UTM corresponding to a flight plan in manned aviation) to the | |||
| USS (call it USS#1) that will serve that UAS (call it UAS#1) for | USS (call it USS#1) that will serve that UAS (call it UAS#1) for | |||
| that operation, primarily to enable deconfliction with other | that operation, primarily to enable deconfliction with other | |||
| operations potentially impinging upon that operation's 4-D | operations potentially impinging upon that operation's 4-D | |||
| airspace volume (call it Volume#1). | airspace volume (call it Volume#1). | |||
| 2. Assuming the operation is approved and commences, UAS#1 | 2. Assuming the operation is approved and commences, UAS#1 | |||
| periodically pushes location/status updates to USS#1, which | periodically pushes location/status updates to USS#1, which | |||
| serves _inter alia_ as the Network RID Service Provider (Net-RID | serves inter alia as the Network RID Service Provider (Net-RID | |||
| SP) for that operation. | SP) for that operation. | |||
| 3. When users of any other USS (whether they be other UAS operators | 3. When users of any other USS (whether they be other UAS operators | |||
| or Observers) develop an interest in any 4-D airspace volume | or Observers) develop an interest in any 4-D airspace volume | |||
| (e.g., because they wish to submit an operational intent or | (e.g., because they wish to submit an operational intent or | |||
| because they have observed a UA), they query their own USS on the | because they have observed a UA), they query their own USS on the | |||
| volumes in which they are interested. | volumes in which they are interested. | |||
| 4. Their USS query, via the UTM Discovery and Synchronization | 4. Their USS query, via the UTM Discovery and Synchronization | |||
| Service (DSS), all other USS in the UTM system, and learn of any | Service (DSS), all other USS in the UTM system and learn of any | |||
| USS that have operations in those volumes (including any volumes | USS that have operations in those volumes (including any volumes | |||
| intersecting them); thus those USS whose query volumes intersect | intersecting them); thus, those USS whose query volumes intersect | |||
| Volume#1 (call them USS#2 through USS#n) learn that USS#1 has | Volume#1 (call them USS#2 through USS#n) learn that USS#1 has | |||
| such operations. | such operations. | |||
| 5. Interested parties can then subscribe to track updates on that | 5. Interested parties can then subscribe to track updates on that | |||
| operation of UAS#1, via their own USS, which serve as Network RID | operation of UAS#1, via their own USS, which serve as Network RID | |||
| Display Providers (Net-RID DP) for that operation. | Display Providers (Net-RID DPs) for that operation. | |||
| 6. USS#1 (as Net-RID SP) will then publish updates of UAS#1 status | 6. USS#1 (as Net-RID SP) will then publish updates of UAS#1 status | |||
| and position to all other subscribed USS in USS#2 through USS#n | and position to all other subscribed USS in USS#2 through USS#n | |||
| (as Net-RID DP). | (as Net-RID DP). | |||
| 7. All Net-RID DP subscribed to that operation of UAS#1 will deliver | 7. All Net-RID DP subscribed to that operation of UAS#1 will deliver | |||
| its track information to their users who subscribed to that | its track information to their users who subscribed to that | |||
| operation of UAS#1 (via means unspecified by [F3411-19] etc., but | operation of UAS#1 (via means unspecified by [F3411-19], etc., | |||
| generally presumed to be web browser based). | but generally presumed to be web browser based). | |||
| Network RID has several connectivity scenarios: | Network RID has several connectivity scenarios: | |||
| _Persistently Internet connected UA_ can consistently directly | * _Persistently Internet-connected UA_ can consistently directly | |||
| source RID information; this requires wireless coverage throughout | source RID information; this requires wireless coverage throughout | |||
| the intended operational airspace volume, plus a buffer (e.g., | the intended operational airspace volume, plus a buffer (e.g., | |||
| winds may drive the UA out of the volume). | winds may drive the UA out of the volume). | |||
| _Intermittently Internet connected UA_, can usually directly | * _Intermittently Internet-connected UA_, can usually directly | |||
| source RID information, but when offline (e.g., due to signal | source RID information, but when offline (e.g., due to signal | |||
| blockage by a large structure being inspected using the UAS), need | blockage by a large structure being inspected using the UAS), need | |||
| the GCS to proxy source RID information. | the GCS to proxy source RID information. | |||
| _Indirectly connected UA_ lack the ability to send IP packets that | * _Indirectly connected UA_ lack the ability to send IP packets that | |||
| will be forwarded into and across the Internet, but instead have | will be forwarded into and across the Internet but instead have | |||
| some other form of communications to another node that can relay | some other form of communications to another node that can relay | |||
| or proxy RID information to the Internet; typically this node | or proxy RID information to the Internet; typically, this node | |||
| would be the GCS (which to perform its function must know where | would be the GCS (which to perform its function must know where | |||
| the UA is, although C2 link outages do occur). | the UA is, although C2 link outages do occur). | |||
| _Non-connected UA_ have no means of sourcing RID information, in | * _Non-connected UA_ have no means of sourcing RID information, in | |||
| which case the GCS or some other interface available to the | which case the GCS or some other interface available to the | |||
| operator must source it. In the extreme case, this could be the | operator must source it. In the extreme case, this could be the | |||
| pilot or other agent of the operator using a web browser/ | pilot or other agent of the operator using a web browser or | |||
| application to designate, to a USS or other UTM entity, a time- | application to designate, to a USS or other UTM entity, a time- | |||
| bounded airspace volume in which an operation will be conducted. | bounded airspace volume in which an operation will be conducted. | |||
| This is referred to as a "non-equipped network participant" | This is referred to as a "non-equipped network participant" | |||
| engaging in "area operations". This may impede disambiguation of | engaging in "area operations". This may impede disambiguation of | |||
| ID if multiple UAS operate in the same or overlapping 4-D volumes. | ID if multiple UAS operate in the same or overlapping 4-D volumes. | |||
| In most airspace volumes, most classes of UA will not be permitted | In most airspace volumes, most classes of UA will not be permitted | |||
| to fly if non-connected. | to fly if non-connected. | |||
| In most cases in the near term (2021), the Network RID first hop data | In most cases in the near term (2021), the Network RID first-hop data | |||
| link is likely to be cellular, which can also support BVLOS C2 over | link is likely to be either cellular (which can also support BVLOS C2 | |||
| existing large coverage areas, or Wi-Fi, which can also support | over existing large coverage areas) or Wi-Fi (which can also support | |||
| Broadcast RID. However, provided the data link can support at least | Broadcast RID). However, provided the data link can support at least | |||
| UDP/IP and ideally also TCP/IP, its type is generally immaterial to | UDP/IP and ideally also TCP/IP, its type is generally immaterial to | |||
| higher layer protocols. The UAS, as the ultimate source of Network | higher-layer protocols. The UAS, as the ultimate source of Network | |||
| RID information, feeds a Net-RID SP (typically the USS to which the | RID information, feeds a Net-RID SP (typically the USS to which the | |||
| UAS operator subscribes), which proxies for the UAS and other data | UAS operator subscribes), which proxies for the UAS and other data | |||
| sources. An Observer or other ultimate consumer of Network RID | sources. An Observer or other ultimate consumer of Network RID | |||
| information obtains it from a Net-RID DP (also typically a USS), | information obtains it from a Net-RID DP (also typically a USS), | |||
| which aggregates information from multiple Net-RID SPs to offer | which aggregates information from multiple Net-RID SPs to offer | |||
| airspace Situational Awareness (SA) coverage of a volume of interest. | airspace Situational Awareness (SA) coverage of a volume of interest. | |||
| Network RID Service and Display Providers are expected to be | ||||
| Network RID Service and Display providers are expected to be | ||||
| implemented as servers in well-connected infrastructure, | implemented as servers in well-connected infrastructure, | |||
| communicating with each other via the Internet, and accessible by | communicating with each other via the Internet and accessible by | |||
| Observers via means such as web Application Programming Interfaces | Observers via means such as web Application Programming Interfaces | |||
| (APIs) and browsers. | (APIs) and browsers. | |||
| Network RID is the less constrained of the defined UAS RID means. | Network RID is the less constrained of the defined means of UAS RID. | |||
| [F3411-19] specifies only Net-RID SP to Net-RID DP information | [F3411-19] only specifies information exchanges from Net-RID SP to | |||
| exchanges. It is presumed that IETF efforts supporting the more | Net-RID DP. It is presumed that IETF efforts supporting the more | |||
| constrained Broadcast RID (see next section) can be generalized for | constrained Broadcast RID (see next section) can be generalized for | |||
| Network RID and potentially also for UAS to USS or other UTM | Network RID and potentially also for UAS-to-USS or other UTM | |||
| communications. | communications. | |||
| 3.2. Broadcast RID | 3.2. Broadcast RID | |||
| Figure 4 illustrates the Broadcast RID information flow. Note the | ||||
| absence of the Internet from the figure. This is because Broadcast | ||||
| RID is one-way direct transmission of application-layer messages over | ||||
| an RF data link (without IP) from the UA to local Observer devices. | ||||
| Internet connectivity is involved only in what the Observer chooses | ||||
| to do with the information received, such as verify signatures using | ||||
| a web-based Broadcast Authentication Verifier Service and look up | ||||
| information in registries using the UAS ID as the primary unique key. | ||||
| +-------------------+ | +-------------------+ | |||
| | Unmanned Aircraft | | | Unmanned Aircraft | | |||
| +---------o---------+ | +---------o---------+ | |||
| | | | | |||
| | | | | |||
| | | | | |||
| | app messages directly over one-way RF data link | | app messages directly over one-way RF data link | |||
| | | | | |||
| | | | | |||
| v | v | |||
| +------------------o-------------------+ | +------------------o-------------------+ | |||
| | Observer's device (e.g., smartphone) | | | Observer's device (e.g., smartphone) | | |||
| +--------------------------------------+ | +--------------------------------------+ | |||
| Figure 4: "Broadcast RID Information Flow" | Figure 4: Broadcast RID Information Flow | |||
| Figure 4 illustrates Broadcast RID information flow. Note the | ||||
| absence of the Internet from the figure. This is because Broadcast | ||||
| RID is one-way direct transmission of application layer messages over | ||||
| a RF data link (without IP) from the UA to local Observer devices. | ||||
| Internet connectivity is involved only in what the Observer chooses | ||||
| to do with the information received, such as verify signatures using | ||||
| a web-based Broadcast Authentication Verifier Service and look up | ||||
| information in registries using the UAS ID as the primary unique key. | ||||
| Broadcast RID is conceptually similar to Automatic Dependent | Broadcast RID is conceptually similar to Automatic Dependent | |||
| Surveillance - Broadcast (ADS-B). However, for various technical and | Surveillance - Broadcast (ADS-B). However, for various technical and | |||
| other reasons, regulators including the EASA have not indicated | other reasons, regulators including the EASA have not indicated | |||
| intent to allow, and FAA has explicitly prohibited, use of ADS-B for | intent to allow, and FAA has explicitly prohibited, use of ADS-B for | |||
| UAS RID. | UAS RID. | |||
| [F3411-19] specifies four Broadcast RID data links: Bluetooth 4.x, | [F3411-19] specifies four Broadcast RID data links: Bluetooth 4.x, | |||
| Bluetooth 5.x with Extended Advertisements and Long Range Coded PHY | Bluetooth 5.x with Extended Advertisements and Long-Range Coded PHY | |||
| (S=8), Wi-Fi NAN at 2.4 GHz, and Wi-Fi NAN at 5 GHz. A UA must | (S=8), Wi-Fi NAN at 2.4 GHz, and Wi-Fi NAN at 5 GHz. A UA must | |||
| broadcast (using advertisement mechanisms where no other option | broadcast (using advertisement mechanisms where no other option | |||
| supports broadcast) on at least one of these. If sending on | supports broadcast) on at least one of these. If sending on | |||
| Bluetooth 5.x, it is also required concurrently to do so on 4.x | Bluetooth 5.x, it is required to do so concurrently on 4.x (referred | |||
| (referred to in [F3411-19] as Bluetooth Legacy); current (2021) | to in [F3411-19] as "Bluetooth Legacy"); current (2021) discussions | |||
| discussions in ASTM F38.02 on revising the standard, motivated by | in ASTM F38.02 on revising [F3411-19], motivated by drafts of | |||
| European standards drafts, suggest that both Bluetooth versions will | European standards, suggest that both Bluetooth versions will be | |||
| be required. If broadcasting Wi-Fi NAN at 5 GHz, it is also required | required. If broadcasting Wi-Fi NAN at 5 GHz, it is required to do | |||
| concurrently to do so at 2.4 GHz; current discussions in F38.02 | so concurrently at 2.4 GHz; current discussions in ASTM F38.02 | |||
| include relaxing this. Wi-Fi Beacons are also under consideration. | include relaxing this. Wi-Fi Beacons are also under consideration. | |||
| Future revisions of [F3411-19] may allow other data links. | Future revisions of [F3411-19] may allow other data links. | |||
| The selection of the Broadcast media was driven by research into what | The selection of Broadcast RID media was driven by research into what | |||
| is commonly available on 'ground' units (smartphones and tablets) and | is commonly available on "ground" units (smartphones and tablets) and | |||
| what was found as prevalent or 'affordable' in UA. Further, there | what was found as prevalent or "affordable" in UA. Further, there | |||
| must be an API for the Observer's receiving application to have | must be an API for the Observer's receiving application to have | |||
| access to these messages. As yet only Bluetooth 4.x support is | access to these messages. As yet, only Bluetooth 4.x support is | |||
| readily available, thus the current focus is on working within the 31 | readily available; thus, the current focus is on working within the | |||
| byte payload limit of the Bluetooth 4.x "Broadcast Frame" transmitted | 31-byte payload limit of the Bluetooth 4.x "Broadcast Frame" | |||
| as an "advertisement" on beacon channels. After overheads, this | transmitted as an "advertisement" on beacon channels. After | |||
| limits the RID message to 25 bytes and UAS ID string to a maximum | overheads, this limits the RID message to 25 bytes and the UAS ID | |||
| length of 20 bytes. | string to a maximum length of 20 bytes. | |||
| Length constraints also preclude a single Bluetooth 4.x frame | A single Bluetooth 4.x advertisement frame can just barely fit any | |||
| carrying not only the UAS ID but also position, velocity, and other | UAS ID long enough to be sufficiently unique for its purpose. | |||
| information that should be bound to the UAS ID, much less strong | ||||
| authentication data. Messages that cannot be encapsulated in a | There is related information, which especially includes, but is not | |||
| single frame (thus far, only the Authentication Message) must be | limited to, the UA position and velocity, which must be represented | |||
| segmented into message "pages" (in the terminology of [F3411-19]). | by data elements long enough to provide precision sufficient for | |||
| Message pages must somehow be correlated as belonging to the same | their purpose while remaining unambiguous with respect to their | |||
| message. Messages carrying position, velocity and other data must | reference frame. | |||
| somehow be correlated with the Basic ID message that carries the UAS | ||||
| ID. This correlation is expected to be done on the basis of MAC | In order to enable Observer devices to verify that 1) the claimed UAS | |||
| address: this may be complicated by MAC address randomization; not | ID is indeed owned by the sender and 2) the related information was | |||
| indeed sent by the owner of that same UAS ID, authentication data | ||||
| elements would typically be lengthy with conventional cryptographic | ||||
| signature schemes. They would be too long to fit in a single frame, | ||||
| even with the latest schemes currently being standardized. | ||||
| Thus, it is infeasible to bundle information related to the UAS ID | ||||
| and corresponding authentication data elements in a single Bluetooth | ||||
| 4.x frame; yet, somehow all these must be securely bound together. | ||||
| Messages that cannot be encapsulated in a single frame (thus far, | ||||
| only the Authentication Message) must be segmented into message | ||||
| "pages" (in the terminology of [F3411-19]). Message pages must | ||||
| somehow be correlated as belonging to the same message. Messages | ||||
| carrying position, velocity and other data must somehow be correlated | ||||
| with the Basic ID Message that carries the UAS ID. This correlation | ||||
| is expected to be done on the basis of Media Access Control (MAC) | ||||
| address. This may be complicated by MAC address randomization. Not | ||||
| all the common devices expected to be used by Observers have APIs | all the common devices expected to be used by Observers have APIs | |||
| that make sender MAC addresses available to user space receiver | that make sender MAC addresses available to user space receiver | |||
| applications; and MAC addresses are easily spoofed. Data elements | applications. MAC addresses are easily spoofed. Data elements are | |||
| are not so detached on other media (see Message Pack in the paragraph | not so detached on other media (see Message Pack in the paragraph | |||
| after next). | after next). | |||
| [F3411-19] Broadcast RID specifies several message types. The 4 bit | [F3411-19] Broadcast RID specifies several message types (see | |||
| message type field in the header can index up to 16 types. Only 7 | Section 5.4.5 and Table 3 of [F3411-19]). The table below lists | |||
| are currently defined. Only 2 are mandatory. All others are | these message types. The 4-bit Message Type field in the header can | |||
| optional, unless required by a jurisdictional authority, e.g., a CAA. | index up to 16 types. Only seven are defined at the time of writing. | |||
| To satisfy both EASA and FAA rules, all types are needed, except | Only two are mandatory. All others are optional, unless required by | |||
| Self-ID and Authentication, as the data elements required by the | a jurisdictional authority, e.g., a CAA. To satisfy both EASA and | |||
| rules are scattered across several message types (along with some | FAA rules, all types are needed, except Self-ID and Authentication, | |||
| data elements not required by the rules). | as the data elements required by the rules are scattered across | |||
| several message types (along with some data elements not required by | ||||
| the rules). | ||||
| The Message Pack (type 0xF) is not actually a message, but the framed | The Message Pack (type 0xF) is not actually a message but the framed | |||
| concatenation of at most one message of each type of any subset of | concatenation of at most one message of each type of any subset of | |||
| the other types, in type index order. Some of the messages that it | the other types, in type index order. Some of the messages that it | |||
| can encapsulate are mandatory, others optional. The Message Pack | can encapsulate are mandatory; others are optional. The Message Pack | |||
| itself is mandatory on data links that can encapsulate it in a single | itself is mandatory on data links that can encapsulate it in a single | |||
| frame (Bluetooth 5.x and Wi-Fi). | frame (Bluetooth 5.x and Wi-Fi). | |||
| +-----------------------+-----------------+-----------+-----------+ | +-------+-----------------+-----------+---------------+ | |||
| | Index | Name | Req | Notes | | | Index | Name | Req | Notes | | |||
| +-----------------------+-----------------+-----------+-----------+ | +-------+-----------------+-----------+---------------+ | |||
| | 0x0 | Basic ID | Mandatory | - | | | 0x0 | Basic ID | Mandatory | - | | |||
| +-----------------------+-----------------+-----------+-----------+ | +-------+-----------------+-----------+---------------+ | |||
| | 0x1 | Location/Vector | Mandatory | - | | | 0x1 | Location/Vector | Mandatory | - | | |||
| +-----------------------+-----------------+-----------+-----------+ | +-------+-----------------+-----------+---------------+ | |||
| | 0x2 | Authentication | Optional | paged | | | 0x2 | Authentication | Optional | paged | | |||
| +-----------------------+-----------------+-----------+-----------+ | +-------+-----------------+-----------+---------------+ | |||
| | 0x3 | Self-ID | Optional | free text | | | 0x3 | Self-ID | Optional | free text | | |||
| +-----------------------+-----------------+-----------+-----------+ | +-------+-----------------+-----------+---------------+ | |||
| | 0x4 | System | Optional | - | | | 0x4 | System | Optional | - | | |||
| +-----------------------+-----------------+-----------+-----------+ | +-------+-----------------+-----------+---------------+ | |||
| | 0x5 | Operator | Optional | - | | | 0x5 | Operator ID | Optional | - | | |||
| +-----------------------+-----------------+-----------+-----------+ | +-------+-----------------+-----------+---------------+ | |||
| | 0xF | Message Pack | - | BT5 and | | | 0xF | Message Pack | - | BT5 and Wi-Fi | | |||
| | | | | Wi-Fi | | +-------+-----------------+-----------+---------------+ | |||
| +-----------------------+-----------------+-----------+-----------+ | ||||
| | See Section 5.4.5 and | - | - | - | | ||||
| | Table 3 of [F3411-19] | | | | | ||||
| +-----------------------+-----------------+-----------+-----------+ | ||||
| Table 1: F3411-19 Message Types | Table 1: Message Types Defined in [F3411-19] | |||
| [F3411-19] Broadcast RID specifies very few quantitative performance | [F3411-19] Broadcast RID specifies very few quantitative performance | |||
| requirements: static information must be transmitted at least once | requirements: static information must be transmitted at least once | |||
| per 3 seconds; dynamic information (the Location/Vector message) must | per three seconds, and dynamic information (the Location/Vector | |||
| be transmitted at least once per second and be no older than one | Message) must be transmitted at least once per second and be no older | |||
| second when sent. [FRUR] requires all information be sent at least | than one second when sent. [FRUR] requires all information be sent | |||
| once per second. | at least once per second. | |||
| [F3411-19] Broadcast RID transmits all information as cleartext | [F3411-19] Broadcast RID transmits all information as cleartext | |||
| (ASCII or binary), so static IDs enable trivial correlation of | (ASCII or binary), so static IDs enable trivial correlation of | |||
| patterns of use, unacceptable in many applications, e.g., package | patterns of use, which is unacceptable in many applications, e.g., | |||
| delivery routes of competitors. | package delivery routes of competitors. | |||
| Any UA can assert any ID using the [F3411-19] required Basic ID | Any UA can assert any ID using the [F3411-19] required Basic ID | |||
| message, which lacks any provisions for verification. The Position/ | Message, which lacks any provisions for verification. The Location/ | |||
| Vector message likewise lacks provisions for verification, and does | Vector Message likewise lacks provisions for verification and does | |||
| not contain the ID, so must be correlated somehow with a Basic ID | not contain the ID, so it must be correlated somehow with a Basic ID | |||
| message: the developers of [F3411-19] have suggested using the MAC | Message: the developers of [F3411-19] have suggested using the MAC | |||
| addresses on the Broadcast RID data link, but these may be randomized | addresses on the Broadcast RID data link, but these may be randomized | |||
| by the operating system stack to avoid the adversarial correlation | by the operating system stack to avoid the adversarial correlation | |||
| problems of static identifiers. | problems of static identifiers. | |||
| The [F3411-19] optional Authentication Message specifies framing for | The [F3411-19] optional Authentication Message specifies framing for | |||
| authentication data, but does not specify any authentication method, | authentication data but does not specify any authentication method, | |||
| and the maximum length of the specified framing is too short for | and the maximum length of the specified framing is too short for | |||
| conventional digital signatures and far too short for conventional | conventional digital signatures and far too short for conventional | |||
| certificates (e.g., X.509). Fetching certificates via the Internet | certificates (e.g., X.509). Fetching certificates via the Internet | |||
| is not always possible (e.g., Observers working in remote areas, such | is not always possible (e.g., Observers working in remote areas, such | |||
| as national forests), so devising a scheme whereby certificates can | as national forests), so devising a scheme whereby certificates can | |||
| be transported over Broadcast RID is necessary. The one-way nature | be transported over Broadcast RID is necessary. The one-way nature | |||
| of Broadcast RID precludes challenge-response security protocols | of Broadcast RID precludes challenge-response security protocols | |||
| (e.g., Observers sending nonces to UA, to be returned in signed | (e.g., Observers sending nonces to UA, to be returned in signed | |||
| messages). Without DRIP extensions to [F3411-19], an Observer would | messages). Without DRIP extensions to [F3411-19], an Observer would | |||
| be seriously challenged to validate the asserted UAS ID or any other | be seriously challenged to validate the asserted UAS ID or any other | |||
| information about the UAS or its operator looked up therefrom. | information about the UAS or its operator looked up therefrom. | |||
| In the currently (2021) proposed revision to ASTM [F3411-19], a new | At the time of writing, the proposed revision of [F3411-19] defines a | |||
| Authentication Type 5 has been defined, "Specific Authentication | new Authentication Type 5 ("Specific Authentication Method (SAM)") to | |||
| Method" (SAM), to enable SDOs other than ASTM to define | enable SDOs other than ASTM to define authentication payload formats. | |||
| authentication payload formats. The first byte of the payload is the | The first byte of the payload is the SAM Type, used to demultiplex | |||
| SAM Type, used to demultiplex such variant formats. All formats for | such variant formats. All formats (aside from those for private | |||
| other than private experimental use must be registered with ICAO, | experimental use) must be registered with ICAO, which assigns the SAM | |||
| which assigns the SAM Type. Any authentication message payload that | Type. Any Authentication Message payload that is to be sent in | |||
| is to be sent in exactly the same form over all currently specified | exactly the same form over all currently specified Broadcast RID | |||
| Broadcast RID media is limited by lower layer constraints to a total | media is limited by lower-layer constraints to a total length of 201 | |||
| length of 201 bytes. For Authentication Type 5, expected to be used | bytes. For Authentication Type 5, which is expected to be used by | |||
| by DRIP, the SAM Type byte consumes the first of these, limiting DRIP | DRIP, the SAM Type byte consumes the first of these, limiting DRIP | |||
| authentication payload formats to a maximum of 200 bytes. | authentication payload formats to a maximum of 200 bytes. | |||
| 3.3. USS in UTM and RID | 3.3. USS in UTM and RID | |||
| UAS RID and UTM are complementary; Network RID is a UTM service. The | UAS RID and UTM are complementary; Network RID is a UTM service. The | |||
| backbone of the UTM system is comprised of multiple USS: one or | backbone of the UTM system is comprised of multiple USS: one or | |||
| several per jurisdiction; some limited to a single jurisdiction, | several per jurisdiction with some being limited to a single | |||
| others spanning multiple jurisdictions. USS also serve as the | jurisdiction while others span multiple jurisdictions. USS also | |||
| principal or perhaps the sole interface for operators and UAS into | serve as the principal, or perhaps the sole, interface for operators | |||
| the UTM environment. Each operator subscribes to at least one USS. | and UAS into the UTM environment. Each operator subscribes to at | |||
| Each UAS is registered by its operator in at least one USS. Each | least one USS. Each UAS is registered by its operator in at least | |||
| operational intent is submitted to one USS; if approved, that UAS and | one USS. Each operational intent is submitted to one USS; if | |||
| operator can commence that operation. During the operation, status | approved, that UAS and operator can commence that operation. During | |||
| and location of that UAS must be reported to that USS, which in turn | the operation, status and location of that UAS must be reported to | |||
| provides information as needed about that operator, UAS, and | that USS, which, in turn, provides information as needed about that | |||
| operation into the UTM system and to Observers via Network RID. | operator, UAS, and operation into the UTM system and to Observers via | |||
| Network RID. | ||||
| USS provide services not limited to Network RID; indeed, the primary | USS provide services not limited to Network RID; indeed, the primary | |||
| USS function is deconfliction of airspace usage by different UAS and | USS function is deconfliction of airspace usage between different UAS | |||
| other (e.g., manned aircraft, rocket launch) operations. Most | (and their operators). It will occasionally deconflict UAS from non- | |||
| UAS operations, such as manned aircraft and rocket launch. Most | ||||
| deconfliction involving a given operation is hoped to be completed | deconfliction involving a given operation is hoped to be completed | |||
| prior to commencing that operation, and is called "strategic | prior to commencing that operation; this is called "strategic | |||
| deconfliction". If that fails, "tactical deconfliction" comes into | deconfliction". If that fails, "tactical deconfliction" comes into | |||
| play; ABDAA may not involve USS, but GBDAA likely will. Dynamic | play; AirBorne DAA (ABDAA) may not involve USS, but Ground-Based DAA | |||
| constraints, formerly called UAS Volume Restrictions (UVR), can be | (GBDAA) likely will. Dynamic constraints, formerly called "UAS | |||
| necessitated by local emergencies, extreme weather, etc., specified | Volume Restrictions (UVRs)", can be necessitated by circumstances | |||
| by authorities on the ground, and propagated in UTM. | such as local emergencies and extreme weather, specified by | |||
| authorities on the ground, and propagated in UTM. | ||||
| No role for USS in Broadcast RID is currently specified by regulators | No role for USS in Broadcast RID is currently specified by regulators | |||
| or [F3411-19]. However, USS are likely to serve as registries (or | or by [F3411-19]. However, USS are likely to serve as registries (or | |||
| perhaps registrars) for UAS (and perhaps operators); if so, USS will | perhaps registrars) for UAS (and perhaps operators); if so, USS will | |||
| have a role in all forms of RID. Supplemental Data Service Providers | have a role in all forms of RID. Supplemental Data Service Providers | |||
| (SDSP) are also likely to find roles, not only in UTM as such but | (SDSPs) are also likely to find roles, not only in UTM as such but | |||
| also in enhancing UAS RID and related services. Whether USS, SDSP, | also in enhancing UAS RID and related services. RID services are | |||
| etc. are involved or not, RID services, narrowly defined, provide | used in concert with USS, SDSP, or other UTM entities (if and as | |||
| regulator specified identification information; more broadly defined, | needed and available). Narrowly defined, RID services provide | |||
| regulator-specified identification information; more broadly defined, | ||||
| RID services may leverage identification to facilitate related | RID services may leverage identification to facilitate related | |||
| services or functions, likely beginning with V2X. | services or functions, likely beginning with V2X. | |||
| 3.4. DRIP Focus | 3.4. DRIP Focus | |||
| In addition to the gaps described above, there is a fundamental gap | In addition to the gaps described above, there is a fundamental gap | |||
| in almost all current or proposed regulations and technical standards | in almost all current or proposed regulations and technical standards | |||
| for UAS RID. As noted above, ID is not an end in itself, but a | for UAS RID. As noted above, ID is not an end in itself, but a | |||
| means. Protocols specified in [F3411-19] etc. provide limited | means. Protocols specified in [F3411-19] etc. provide limited | |||
| information potentially enabling, and no technical means for, an | information potentially enabling (but no technical means for) an | |||
| Observer to communicate with the pilot, e.g., to request further | Observer to communicate with the pilot, e.g., to request further | |||
| information on the UAS operation or exit from an airspace volume in | information on the UAS operation or exit from an airspace volume in | |||
| an emergency. The System Message provides the location of the pilot/ | an emergency. The System Message provides the location of the pilot/ | |||
| GCS, so an Observer could physically go to the asserted location to | GCS, so an Observer could physically go to the asserted location to | |||
| look for the remote pilot; this is at best slow and may not be | look for the Remote Pilot; this is slow, at best, and may not be | |||
| feasible. What if the pilot is on the opposite rim of a canyon, or | feasible. What if the pilot is on the opposite rim of a canyon, or | |||
| there are multiple UAS operators to contact, whose GCS all lie in | there are multiple UAS operators to contact whose GCS all lie in | |||
| different directions from the Observer? An Observer with Internet | different directions from the Observer? An Observer with Internet | |||
| connectivity and access privileges could look up operator PII in a | connectivity and access privileges could look up operator PII in a | |||
| registry, then call a phone number in hopes someone who can | registry and then call a phone number in hopes that someone who can | |||
| immediately influence the UAS operation will answer promptly during | immediately influence the UAS operation will answer promptly during | |||
| that operation; this is at best unreliable and may not be prudent. | that operation; this is unreliable, at best, and may not be prudent. | |||
| Should pilots be encouraged to answer phone calls while flying? | Should pilots be encouraged to answer phone calls while flying? | |||
| Internet technologies can do much better than this. | Internet technologies can do much better than this. | |||
| Thus complementing [F3411-19] with protocols enabling strong | Thus, to achieve widespread adoption of a RID system supporting safe | |||
| authentication, preserving operator privacy while enabling immediate | and secure operation of UAS, protocols must do the following (despite | |||
| use of information by authorized parties, is critical to achieve | the intrinsic tension among these objectives): | |||
| widespread adoption of a RID system supporting safe and secure | ||||
| operation of UAS. Just as [F3411-19] is expected to be approved by | * preserve operator privacy, | |||
| regulators as a basic means of compliance with UAS RID regulations, | ||||
| DRIP is expected likewise to be approved to address further issues, | * enable strong authentication, and | |||
| starting with the creation and registration of Session IDs. | ||||
| * enable the immediate use of information by authorized parties. | ||||
| Just as [F3411-19] is expected to be approved by regulators as a | ||||
| basic means of compliance with UAS RID regulations, DRIP is likewise | ||||
| expected to be approved to address further issues, starting with the | ||||
| creation and registration of Session IDs. | ||||
| DRIP will focus on making information obtained via UAS RID | DRIP will focus on making information obtained via UAS RID | |||
| immediately usable: | immediately usable: | |||
| 1. by making it trustworthy (despite the severe constraints of | 1. by making it trustworthy (despite the severe constraints of | |||
| Broadcast RID); | Broadcast RID); | |||
| 2. by enabling verification that a UAS is registered for RID, and if | 2. by enabling verification that a UAS is registered for RID, and, | |||
| so, in which registry (for classification of trusted operators on | if so, in which registry (for classification of trusted operators | |||
| the basis of known registry vetting, even by Observers lacking | on the basis of known registry vetting, even by Observers lacking | |||
| Internet connectivity at observation time); | Internet connectivity at observation time); | |||
| 3. by facilitating independent reports of UA aeronautical data | 3. by facilitating independent reports of UA aeronautical data | |||
| (location, velocity, etc.) to confirm or refute the operator | (location, velocity, etc.) to confirm or refute the operator | |||
| self-reports upon which UAS RID and UTM tracking are based; | self-reports upon which UAS RID and UTM tracking are based; | |||
| 4. by enabling instant establishment, by authorized parties, of | 4. by enabling instant establishment, by authorized parties, of | |||
| secure communications with the remote pilot. | secure communications with the Remote Pilot. | |||
| The foregoing considerations, beyond those addressed by baseline UAS | The foregoing considerations, beyond those addressed by baseline UAS | |||
| RID standards such as [F3411-19], imply the following requirements | RID standards such as [F3411-19], imply the requirements for DRIP | |||
| for DRIP. | detailed in Section 4. | |||
| 4. Requirements | 4. Requirements | |||
| The following requirements apply to DRIP as a set of related | The following requirements apply to DRIP as a set of related | |||
| protocols, various subsets of which, in conjunction with other IETF | protocols, various subsets of which, in conjunction with other IETF | |||
| and external technical standards, may suffice to comply with the | and external technical standards, may suffice to comply with the | |||
| regulations in any given jurisdiction or meet any given user need. | regulations in any given jurisdiction or meet any given user need. | |||
| It is not intended that each and every DRIP protocol alone satisfy | It is not intended that each and every protocol of the DRIP set, | |||
| each and every requirement. To satisfy these requirements, Internet | alone, satisfy each and every requirement. To satisfy these | |||
| connectivity is required some of the time: e.g., to support DRIP | requirements, Internet connectivity is required some of the time | |||
| entity identifier creation/registration; but not all of the time, | (e.g., to support DRIP Entity Identifier creation/registration) but | |||
| e.g., authentication of an asserted DRIP entity identifier can be | not all of the time (e.g., authentication of an asserted DRIP Entity | |||
| achieved by a fully working and provisioned Observer device even when | Identifier can be achieved by a fully working and provisioned | |||
| that device is off-line so is required at all times. | Observer device even when that device is off-line so is required at | |||
| all times). | ||||
| 4.1. General | 4.1. General | |||
| 4.1.1. Normative Requirements | 4.1.1. Normative Requirements | |||
| GEN-1 Provable Ownership: DRIP MUST enable verification that the | GEN-1 Provable Ownership: DRIP MUST enable verification that the | |||
| asserted entity (typically UAS) ID is that of the actual | asserted entity (typically UAS) ID is that of the actual | |||
| current sender (i.e., the entity ID in the DRIP authenticated | current sender (i.e., the Entity ID in the DRIP | |||
| message set is not a replay attack or other spoof, e.g., by | authenticated message set is not a replay attack or other | |||
| verifying an asymmetric cryptographic signature using a | spoof), even on an Observer device lacking Internet | |||
| sender provided public key from which the asserted UAS ID can | connectivity at the time of observation. | |||
| be at least partially derived), even on an Observer device | ||||
| lacking Internet connectivity at the time of observation. | ||||
| GEN-2 Provable Binding: DRIP MUST enable the cryptographic binding | GEN-2 Provable Binding: DRIP MUST enable the cryptographic binding | |||
| of all other [F3411-19] messages from the same actual current | of all other [F3411-19] messages from the same actual | |||
| sender to the UAS ID asserted in the Basic ID message. | current sender to the UAS ID asserted in the Basic ID | |||
| Message. | ||||
| GEN-3 Provable Registration: DRIP MUST enable cryptographically | GEN-3 Provable Registration: DRIP MUST enable cryptographically | |||
| secure verification that the UAS ID is in a registry and | secure verification that the UAS ID is in a registry and | |||
| identification of that registry, even on an Observer device | identification of that registry, even on an Observer device | |||
| lacking Internet connectivity at the time of observation; the | lacking Internet connectivity at the time of observation; | |||
| same sender may have multiple IDs, potentially in different | the same sender may have multiple IDs, potentially in | |||
| registries, but each ID must clearly indicate in which | different registries, but each ID must clearly indicate in | |||
| registry it can be found. | which registry it can be found. | |||
| GEN-4 Readability: DRIP MUST enable information (regulation | GEN-4 Readability: DRIP MUST enable information (regulation | |||
| required elements, whether sent via UAS RID or looked up in | required elements, whether sent via UAS RID or looked up in | |||
| registries) to be read and utilized by both humans and | registries) to be read and utilized by both humans and | |||
| software. | software. | |||
| GEN-5 Gateway: DRIP MUST enable Broadcast RID to Network RID | GEN-5 Gateway: DRIP MUST enable application-layer gateways from | |||
| application layer gateways to stamp messages with precise | Broadcast RID to Network RID to stamp messages with precise | |||
| date/time received and receiver location, then relay them to | date/time received and receiver location, then relay them to | |||
| a network service (e.g., SDSP or distributed ledger) whenever | a network service (e.g., SDSP or distributed ledger) | |||
| the gateway has Internet connectivity. | whenever the gateway has Internet connectivity. | |||
| GEN-6 Contact: DRIP MUST enable dynamically establishing, with AAA, | GEN-6 Contact: DRIP MUST enable dynamically establishing, with | |||
| per policy, strongly mutually authenticated, end-to-end | AAA, per policy, strongly mutually authenticated, end-to-end | |||
| strongly encrypted communications with the UAS RID sender and | strongly encrypted communications with the UAS RID sender | |||
| entities looked up from the UAS ID, including at least the | and entities looked up from the UAS ID, including at least | |||
| pilot (remote pilot or Pilot In Command), the USS (if any) | the (1) pilot (Remote Pilot or Pilot In Command), (2) the | |||
| under which the operation is being conducted, and registries | USS (if any) under which the operation is being conducted, | |||
| in which data on the UA and pilot are held, whenever each | and (3) registries in which data on the UA and pilot are | |||
| party to such desired communications has a currently usable | held. This requirement applies whenever each party to such | |||
| means of resolving the other party's DRIP entity identifier | desired communications has a currently usable means of | |||
| to a locator (IP address) and currently usable bidirectional | resolving the other party's DRIP Entity Identifier to a | |||
| IP (not necessarily Internet) connectivity with the other | locator (IP address) and currently usable bidirectional IP | |||
| party. | (not necessarily Internet) connectivity with the other | |||
| party. | ||||
| GEN-7 QoS: DRIP MUST enable policy based specification of | GEN-7 QoS: DRIP MUST enable policy-based specification of | |||
| performance and reliability parameters. | performance and reliability parameters. | |||
| GEN-8 Mobility: DRIP MUST support physical and logical mobility of | GEN-8 Mobility: DRIP MUST support physical and logical mobility of | |||
| UA, GCS and Observers. DRIP SHOULD support mobility of | UA, GCS, and Observers. DRIP SHOULD support mobility of | |||
| essentially all participating nodes (UA, GCS, Observers, Net- | essentially all participating nodes (UA, GCS, Observers, | |||
| RID SP, Net-RID DP, Private Registry, SDSP, and potentially | Net-RID SP, Net-RID DP, Private Registries, SDSP, and | |||
| others as RID and UTM evolve). | potentially others as RID and UTM evolve). | |||
| GEN-9 Multihoming: DRIP MUST support multihoming of UA and GCS, for | GEN-9 Multihoming: DRIP MUST support multihoming of UA and GCS, | |||
| make-before-break smooth handoff and resiliency against path/ | for make-before-break smooth handoff and resiliency against | |||
| link failure. DRIP SHOULD support multihoming of essentially | path or link failure. DRIP SHOULD support multihoming of | |||
| all participating nodes. | essentially all participating nodes. | |||
| GEN-10 Multicast: DRIP SHOULD support multicast for efficient and | GEN-10 Multicast: DRIP SHOULD support multicast for efficient and | |||
| flexible publish-subscribe notifications, e.g., of UAS | flexible publish-subscribe notifications, e.g., of UAS | |||
| reporting positions in designated airspace volumes. | reporting positions in designated airspace volumes. | |||
| GEN-11 Management: DRIP SHOULD support monitoring of the health and | GEN-11 Management: DRIP SHOULD support monitoring of the health and | |||
| coverage of Broadcast and Network RID services. | coverage of Broadcast and Network RID services. | |||
| 4.1.2. Rationale | 4.1.2. Rationale | |||
| Requirements imposed either by regulation or [F3411-19] are not | Requirements imposed either by regulation or by [F3411-19] are not | |||
| reiterated here, but drive many of the numbered requirements listed | reiterated in this document, but they drive many of the numbered | |||
| here. The [FRUR] regulatory QoS requirement currently would be | requirements listed here. The regulatory performance requirement in | |||
| satisfied by ensuring information refresh rates of at least 1 Hertz, | [FRUR] currently would be satisfied by ensuring information refresh | |||
| with latencies no greater than 1 second, at least 80% of the time, | rates of at least 1 Hertz, with latencies no greater than 1 second, | |||
| but these numbers may vary between jurisdictions and over time. So | at least 80% of the time, but these numbers may vary between | |||
| instead the DRIP QoS requirement is that performance, reliability, | jurisdictions and over time. Instead, the DRIP QoS requirement is | |||
| etc. parameters be user policy specifiable, which does not imply | that parameters such as performance and reliability be specifiable by | |||
| satisfiable in all cases, but (especially together with the | user policy, which does not imply satisfiable in all cases but does | |||
| management requirement) implies that when specifications are not met, | imply (especially together with the Management requirement) that when | |||
| appropriate parties are notified. | specifications are not met, appropriate parties are notified. | |||
| The "provable ownership" requirement addresses the possibility that | The Provable Ownership requirement addresses the possibility that the | |||
| the actual sender is not the claimed sender (i.e., is a spoofer). | actual sender is not the claimed sender (i.e., is a spoofer). DRIP | |||
| The "provable binding" requirement addresses the MAC address | could meet this requirement by, for example, verifying an asymmetric | |||
| correlation problem of [F3411-19] noted above. The "provable | cryptographic signature using a sender-provided public key from which | |||
| registration" requirement may impose burdens not only on the UAS | the asserted UAS ID can be at least partially derived. The Provable | |||
| sender and the Observer's receiver, but also on the registry; yet it | Binding requirement addresses the problem with MAC address | |||
| correlation [F3411-19] noted in Section 3.2. The Provable | ||||
| Registration requirement may impose burdens not only on the UAS | ||||
| sender and the Observer's receiver, but also on the registry; yet, it | ||||
| cannot depend upon the Observer being able to contact the registry at | cannot depend upon the Observer being able to contact the registry at | |||
| the time of observing the UA. The "readability" requirement pertains | the time of observing the UA. The Readability requirement pertains | |||
| to the structure and format of information at endpoints rather than | to the structure and format of information at endpoints rather than | |||
| its encoding in transit, so may involve machine assisted format | its encoding in transit, so it may involve machine-assisted format | |||
| conversions, e.g., from binary encodings, and/or decryption (see | conversions (e.g., from binary encodings) and/or decryption (see | |||
| Section 4.3). | Section 4.3). | |||
| The "gateway" requirement is in pursuit of three objectives: (1) mark | The Gateway requirement is in pursuit of three objectives: (1) mark | |||
| up a RID message with where and when it was actually received, which | up a RID message with where and when it was actually received, which | |||
| may agree or disagree with the self-report in the set of messages; | may agree or disagree with the self-report in the set of messages; | |||
| (2) defend against replay attacks; and (3) support optional SDSP | (2) defend against replay attacks; and (3) support optional SDSP | |||
| services such as multilateration, to complement UAS position self- | services such as multilateration, to complement UAS position self- | |||
| reports with independent measurements. This is the only instance in | reports with independent measurements. This is the only instance in | |||
| which DRIP transports [F3411-19] messages; most of DRIP pertains to | which DRIP transports [F3411-19] messages; most of DRIP pertains to | |||
| the authentication of such messages and identifiers carried in them. | the authentication of such messages and identifiers carried in them. | |||
| The "contact" requirement allows any party that learns a UAS ID (that | The Contact requirement allows any party that learns a UAS ID (that | |||
| is a DRIP entity identifier rather than another UAS ID Type) to | is a DRIP Entity Identifier rather than another ID Type) to request | |||
| request establishment of a communications session with the | establishment of a communications session with the corresponding UAS | |||
| corresponding UAS RID sender and certain entities associated with | RID sender and certain entities associated with that UAS, but AAA and | |||
| that UAS, but AAA and policy restrictions, _inter alia_ on resolving | policy restrictions, inter alia on resolving the identifier to any | |||
| the identifier to any locators (typically IP addresses), should | locators (typically IP addresses), should prevent unauthorized | |||
| prevent unauthorized parties from distracting or harassing pilots. | parties from distracting or harassing pilots. Thus, some but not all | |||
| Thus some but not all Observers of UA, receivers of Broadcast RID, | Observers of UA, receivers of Broadcast RID, clients of Network RID, | |||
| clients of Network RID, and other parties can become successfully | and other parties can become successfully initiating endpoints for | |||
| initiating endpoints for these sessions. | these sessions. | |||
| The "QoS" requirement is only that performance and reliability | The QoS requirement is only that performance and reliability | |||
| parameters can be _specified_ by policy, not that any such | parameters can be _specified_ by policy, not that any such | |||
| specifications must be guaranteed to be met; any failure to meet such | specifications must be guaranteed to be met; any failure to meet such | |||
| would be reported under the "management" requirement. Examples of | would be reported under the Management requirement. Examples of such | |||
| such parameters are the maximum time interval at which messages | parameters are the maximum time interval at which messages carrying | |||
| carrying required data elements may be transmitted, the maximum | required data elements may be transmitted, the maximum tolerable rate | |||
| tolerable rate of loss of such messages, and the maximum tolerable | of loss of such messages, and the maximum tolerable latency between a | |||
| latency between a dynamic data element (e.g., GNSS position of UA) | dynamic data element (e.g., GNSS position of UA) being provided to | |||
| being provided to the DRIP sender and that element being delivered by | the DRIP sender and that element being delivered by the DRIP receiver | |||
| the DRIP receiver to an application. | to an application. | |||
| The "mobility" requirement refers to rapid geographic mobility of | The Mobility requirement refers to rapid geographic mobility of | |||
| nodes, changes of their points of attachment to networks, and changes | nodes, changes of their points of attachment to networks, and changes | |||
| to their IP addresses; it is not limited to micro-mobility within a | to their IP addresses; it is not limited to micro-mobility within a | |||
| small geographic area or single Internet access provider. | small geographic area or single Internet access provider. | |||
| 4.2. Identifier | 4.2. Identifier | |||
| 4.2.1. Normative Requirements | 4.2.1. Normative Requirements | |||
| ID-1 Length: The DRIP entity identifier MUST NOT be longer than 19 | ID-1 Length: The DRIP Entity Identifier MUST NOT be longer than | |||
| bytes, to fit in the Specific Session ID subfield of the UAS ID | 19 bytes, to fit in the Specific Session ID subfield of the | |||
| field of the Basic ID message of the currently (August 2021) | UAS ID field of the Basic ID Message of the proposed | |||
| proposed revision of [F3411-19]. | revision of [F3411-19] (at the time of writing). | |||
| ID-2 Registry ID: The DRIP identifier MUST be sufficient to identify | ID-2 Registry ID: The DRIP identifier MUST be sufficient to | |||
| a registry in which the entity identified therewith is listed. | identify a registry in which the entity identified therewith | |||
| is listed. | ||||
| ID-3 Entity ID: The DRIP identifier MUST be sufficient to enable | ID-3 Entity ID: The DRIP identifier MUST be sufficient to enable | |||
| lookups of other data associated with the entity identified | lookups of other data associated with the entity identified | |||
| therewith in that registry. | therewith in that registry. | |||
| ID-4 Uniqueness: The DRIP identifier MUST be unique within the | ID-4 Uniqueness: The DRIP identifier MUST be unique within the | |||
| applicable global identifier space from when it is first | applicable global identifier space from when it is first | |||
| registered therein until it is explicitly de-registered | registered therein until it is explicitly deregistered | |||
| therefrom (due to, e.g., expiration after a specified lifetime, | therefrom (due to, e.g., expiration after a specified | |||
| revocation by the registry, or surrender by the operator). | lifetime, revocation by the registry, or surrender by the | |||
| operator). | ||||
| ID-5 Non-spoofability: The DRIP identifier MUST NOT be spoofable | ID-5 Non-spoofability: The DRIP identifier MUST NOT be spoofable | |||
| within the context of a minimal Remote ID broadcast message set | within the context of a minimal Remote ID broadcast message | |||
| (to be specified within DRIP to be sufficient collectively to | set (to be specified within DRIP to be sufficient | |||
| prove sender ownership of the claimed identifier). | collectively to prove sender ownership of the claimed | |||
| identifier). | ||||
| ID-6 Unlinkability: The DRIP identifier MUST NOT facilitate | ID-6 Unlinkability: The DRIP identifier MUST NOT facilitate | |||
| adversarial correlation over multiple operations. If this is | adversarial correlation over multiple operations. If this | |||
| accomplished by limiting each identifier to a single use or | is accomplished by limiting each identifier to a single use | |||
| brief period of usage, the DRIP identifier MUST support well- | or brief period of usage, the DRIP identifier MUST support | |||
| defined, scalable, timely registration methods. | well-defined, scalable, timely registration methods. | |||
| 4.2.2. Rationale | 4.2.2. Rationale | |||
| The DRIP identifier can refer to various entities. In the primary | The DRIP identifier can refer to various entities. In the primary | |||
| initial use case, the entity to be identified is the UA. Entities to | initial use case, the entity to be identified is the UA. Entities to | |||
| be identified in other likely use cases include but are not limited | be identified in other likely use cases include, but are not limited | |||
| to the operator, USS, and Observer. In all cases, the entity | to, the operator, USS, and Observer. In all cases, the entity | |||
| identified must own (have the exclusive capability to use, such that | identified must own the identifier (i.e., have the exclusive | |||
| receivers can verify its ownership of) the identifier. | capability to use the identifier, such that receivers can verify the | |||
| entity's ownership of it). | ||||
| The DRIP identifier can be used at various layers. In Broadcast RID, | The DRIP identifier can be used at various layers. In Broadcast RID, | |||
| it would be used by the application running directly over the data | it would be used by the application running directly over the data | |||
| link. In Network RID, it would be used by the application running | link. In Network RID, it would be used by the application running | |||
| over HTTPS (not required by DRIP but generally used by Network RID | over HTTPS (not required by DRIP but generally used by Network RID | |||
| implementations) and possibly other protocols. In RID initiated V2X | implementations) and possibly other protocols. In RID-initiated V2X | |||
| applications such as DAA and C2, it could be used between the network | applications such as DAA and C2, it could be used between the network | |||
| and transport layers, e.g., with the Host Identity Protocol (HIP, | and transport layers (e.g., with the Host Identity Protocol (HIP) | |||
| [RFC9063], [RFC7401], etc.), or between the transport and application | [RFC9063] [RFC7401]) or between the transport and application layers | |||
| layers, e.g., with Datagram Transport Layer Security (DTLS, | (e.g., with DTLS [RFC6347]). | |||
| [RFC6347]). | ||||
| Registry ID (which registry the entity is in) and Entity ID (which | Registry ID (which registry the entity is in) and Entity ID (which | |||
| entity it is, within that registry) are requirements on a single DRIP | entity it is, within that registry) are requirements on a single DRIP | |||
| entity identifier, not separate (types of) ID. In the most common | Entity Identifier, not separate (types of) ID. In the most common | |||
| use case, the entity will be the UA, and the DRIP identifier will be | use case, the entity will be the UA, and the DRIP identifier will be | |||
| the UAS ID; however, other entities may also benefit from having DRIP | the UAS ID; however, other entities may also benefit from having DRIP | |||
| identifiers, so the entity type is not prescribed here. | identifiers, so the entity type is not prescribed here. | |||
| Whether a UAS ID is generated by the operator, GCS, UA, USS, | Whether a UAS ID is generated by the operator, GCS, UA, USS, | |||
| registry, or some collaboration thereamong, is unspecified; however, | registry, or some collaboration among them is unspecified; however, | |||
| there must be agreement on the UAS ID among these entities. | there must be agreement on the UAS ID among these entities. | |||
| Management of DRIP identifiers is the primary function of their | Management of DRIP identifiers is the primary function of their | |||
| registration hierarchies, from the root (presumably IANA), through | registration hierarchies, from the root (presumably IANA), through | |||
| sector-specific and regional authorities (presumably ICAO and CAAs), | sector-specific and regional authorities (presumably ICAO and CAAs), | |||
| to the identified entities themselves. | to the identified entities themselves. | |||
| While "uniqueness" might be considered an implicit requirement for | While Uniqueness might be considered an implicit requirement for any | |||
| any identifier, here the point of the explicit requirement is not | identifier, here the point of the explicit requirement is not just | |||
| just that it should be unique, but also where and when it should be | that it should be unique, but also where and when it should be | |||
| unique: global scope within a specified space, from registration to | unique: global scope within a specified space, from registration to | |||
| deregistration. | deregistration. | |||
| While "non-spoofability" imposes requirements for and on a DRIP | While Non-spoofability imposes requirements for and on a DRIP | |||
| authentication protocol, it also imposes requirements on the | authentication protocol, it also imposes requirements on the | |||
| properties of the identifier itself. An example of how the nature of | properties of the identifier itself. An example of how the nature of | |||
| the identifier can support non-spoofability is embedding a hash of | the identifier can support non-spoofability is embedding a hash of | |||
| both the registry ID and a public key of the entity in the entity | both the Registry ID and a public key of the entity in the entity | |||
| identifier, thus making it self-authenticating any time the entity's | identifier, thus making it self-authenticating any time the entity's | |||
| corresponding private key is used to sign a message. | corresponding private key is used to sign a message. | |||
| While "unlinkability" is a privacy desideratum (see next section), it | While Unlinkability is a privacy desideratum (see Section 4.3), it | |||
| imposes requirements on the DRIP identifier itself, as distinct from | imposes requirements on the DRIP identifier itself, as distinct from | |||
| other currently permitted choices for the UAS ID (including primarily | other currently permitted choices for the UAS ID (including primarily | |||
| the static serial number of the UA or RID module). | the static serial number of the UA or RID module). | |||
| 4.3. Privacy | 4.3. Privacy | |||
| 4.3.1. Normative Requirements | 4.3.1. Normative Requirements | |||
| PRIV-1 Confidential Handling: DRIP MUST enable confidential handling | PRIV-1 Confidential Handling: DRIP MUST enable confidential | |||
| of private information (i.e., any and all information | handling of private information (i.e., any and all | |||
| designated by neither cognizant authority nor the information | information that neither the cognizant authority nor the | |||
| owner as public, e.g., personal data). | information owner has designated as public, e.g., personal | |||
| data). | ||||
| PRIV-2 Encrypted Transport: DRIP MUST enable selective strong | PRIV-2 Encrypted Transport: DRIP MUST enable selective strong | |||
| encryption of private data in motion in such a manner that | encryption of private data in motion in such a manner that | |||
| only authorized actors can recover it. If transport is via | only authorized actors can recover it. If transport is via | |||
| IP, then encryption MUST be end-to-end, at or above the IP | IP, then encryption MUST be end-to-end, at or above the IP | |||
| layer. DRIP MUST NOT encrypt safety critical data to be | layer. DRIP MUST NOT encrypt safety critical data to be | |||
| transmitted over Broadcast RID in any situation where it is | transmitted over Broadcast RID in any situation where it is | |||
| unlikely that local Observers authorized to access the | unlikely that local Observers authorized to access the | |||
| plaintext will be able to decrypt it or obtain it from a | plaintext will be able to decrypt it or obtain it from a | |||
| service able to decrypt it. DRIP MUST NOT encrypt data when/ | service able to decrypt it. DRIP MUST NOT encrypt data | |||
| where doing so would conflict with applicable regulations or | when/where doing so would conflict with applicable | |||
| CAA policies/procedures, i.e., DRIP MUST support configurable | regulations or CAA policies/procedures, i.e., DRIP MUST | |||
| disabling of encryption. | support configurable disabling of encryption. | |||
| PRIV-3 Encrypted Storage: DRIP SHOULD facilitate selective strong | PRIV-3 Encrypted Storage: DRIP SHOULD facilitate selective strong | |||
| encryption of private data at rest in such a manner that only | encryption of private data at rest in such a manner that | |||
| authorized actors can recover it. | only authorized actors can recover it. | |||
| PRIV-4 Public/Private Designation: DRIP SHOULD facilitate | PRIV-4 Public/Private Designation: DRIP SHOULD facilitate | |||
| designation, by cognizant authorities and information owners, | designation, by cognizant authorities and information | |||
| of which information is public and which is private. By | owners, of which information is public and which is private. | |||
| default, all information required to be transmitted via | By default, all information required to be transmitted via | |||
| Broadcast RID, even when actually sent via Network RID or | Broadcast RID, even when actually sent via Network RID or | |||
| stored in registries, is assumed to be public; all other | stored in registries, is assumed to be public; all other | |||
| information held in registries for lookup using the UAS ID is | information held in registries for lookup using the UAS ID | |||
| assumed to be private. | is assumed to be private. | |||
| PRIV-5 Pseudonymous Rendezvous: DRIP MAY enable mutual discovery of | PRIV-5 Pseudonymous Rendezvous: DRIP MAY enable mutual discovery of | |||
| and communications among participating UAS operators whose UA | and communications among participating UAS operators whose | |||
| are in 4-D proximity, using the UAS ID without revealing | UA are in 4-D proximity, using the UAS ID without revealing | |||
| pilot/operator identity or physical location. | pilot/operator identity or physical location. | |||
| 4.3.2. Rationale | 4.3.2. Rationale | |||
| Most data to be sent via Broadcast RID or Network RID is public, thus | Most data to be sent via Broadcast RID or Network RID is public; | |||
| the "encrypted transport" requirement for private data is selective, | thus, the Encrypted Transport requirement for private data is | |||
| e.g., for the entire payload of the Operator ID Message, but only the | selective, e.g., for the entire payload of the Operator ID Message, | |||
| pilot/GCS location fields of the System Message. Safety critical | but only the pilot/GCS location fields of the System Message. Safety | |||
| data includes at least the UA location. Other data also may be | critical data includes at least the UA location. Other data also may | |||
| deemed safety critical, e.g., in some jurisdictions the pilot/GCS | be deemed safety critical, e.g., in some jurisdictions the pilot/GCS | |||
| location is implied to be safety critical. | location is implied to be safety critical. | |||
| UAS have several potential means of assessing the likelihood that | UAS have several potential means of assessing the likelihood that | |||
| local Observers authorized to access the plaintext will be able to | local Observers authorized to access the plaintext will be able to | |||
| decrypt it or obtain it from a service able to decrypt it. If the | decrypt it or obtain it from a service able to decrypt it. If the | |||
| UAS is not participating in UTM, an Observer would have no means of | UAS is not participating in UTM, an Observer would have no means of | |||
| obtaining a decryption key or decryption services from a cognizant | obtaining a decryption key or decryption services from a cognizant | |||
| USS. If the UAS is participating in UTM, but has lost connectivity | USS. If the UAS is participating in UTM but has lost connectivity | |||
| with its USS, then an Observer within visual LOS of the UA is also | with its USS, then an Observer within visual LOS of the UA is also | |||
| unlikely to be able to communicate with that USS (whether due to the | unlikely to be able to communicate with that USS (whether due to the | |||
| USS being offline or the UAS and Observer being in an area with poor | USS being offline or the UAS and Observer being in an area with poor | |||
| Internet connectivity). Either of these conditions (UTM non- | Internet connectivity). Either of these conditions (UTM non- | |||
| participation or USS unreachability) would be known to the UAS. | participation or USS unreachability) would be known to the UAS. | |||
| In some jurisdictions, the configurable enabling and disabling of | In some jurisdictions, the configurable enabling and disabling of | |||
| encryption may need to be outside the control of the operator. | encryption may need to be outside the control of the operator. | |||
| [FRUR] mandates manufacturers design RID equipment with some degree | [FRUR] mandates that manufacturers design RID equipment with some | |||
| of tamper resistance; the preamble and other FAA commentary suggest | degree of tamper resistance; the preamble of [FRUR] and other FAA | |||
| this is to reduce the likelihood that an operator, intentionally or | commentary suggest this is to reduce the likelihood that an operator, | |||
| unintentionally, might alter the values of the required data elements | intentionally or unintentionally, might alter the values of the | |||
| or disable their transmission in the required manner (e.g., as | required data elements or disable their transmission in the required | |||
| cleartext). | manner (e.g., as cleartext). | |||
| How information is stored on end systems is out of scope for DRIP. | How information is stored on end systems is out of scope for DRIP. | |||
| Encouraging privacy best practices, including end system storage | Encouraging privacy best practices, including end system storage | |||
| encryption, by facilitating it with protocol design reflecting such | encryption, by facilitating it with protocol design reflecting such | |||
| considerations, is in scope. Similar logic applies to methods for | considerations is in scope. Similar logic applies to methods for | |||
| designating information as public or private. | designating information as public or private. | |||
| The privacy requirements above are for DRIP, neither for [F3411-19] | The Privacy requirements above are for DRIP, neither for [F3411-19] | |||
| (which requires obfuscation of location to any Network RID subscriber | (which, in the interest of privacy, requires obfuscation of location | |||
| engaging in wide area surveillance, limits data retention periods, | to any Network RID subscriber engaging in wide area surveillance, | |||
| etc., in the interests of privacy), nor for UAS RID in any specific | limits data retention periods, etc.), nor for UAS RID in any specific | |||
| jurisdiction (which may have its own regulatory requirements). The | jurisdiction (which may have its own regulatory requirements). The | |||
| requirements above are also in a sense parameterized: who are the | requirements above are also in a sense parameterized: who are the | |||
| "authorized actors", how are they designated, how are they | "authorized actors", how are they designated, how are they | |||
| authenticated, etc.? | authenticated, etc.? | |||
| 4.4. Registries | 4.4. Registries | |||
| 4.4.1. Normative Requirements | 4.4.1. Normative Requirements | |||
| REG-1 Public Lookup: DRIP MUST enable lookup, from the UAS ID, of | REG-1 Public Lookup: DRIP MUST enable lookup, from the UAS ID, of | |||
| information designated by cognizant authority as public, and | information designated by cognizant authority as public and | |||
| MUST NOT restrict access to this information based on identity | MUST NOT restrict access to this information based on | |||
| or role of the party submitting the query. | identity or role of the party submitting the query. | |||
| REG-2 Private Lookup: DRIP MUST enable lookup of private information | REG-2 Private Lookup: DRIP MUST enable lookup of private | |||
| (i.e., any and all information in a registry, associated with | information (i.e., any and all information in a registry, | |||
| the UAS ID, that is designated by neither cognizant authority | associated with the UAS ID, that is designated by neither | |||
| nor the information owner as public), and MUST, according to | cognizant authority nor the information owner as public), | |||
| applicable policy, enforce AAA, including restriction of | and MUST, according to applicable policy, enforce AAA, | |||
| access to this information based on identity or role of the | including restriction of access to this information based on | |||
| party submitting the query. | identity or role of the party submitting the query. | |||
| REG-3 Provisioning: DRIP MUST enable provisioning registries with | REG-3 Provisioning: DRIP MUST enable provisioning registries with | |||
| static information on the UAS and its operator, dynamic | static information on the UAS and its operator, dynamic | |||
| information on its current operation within the U-space/UTM | information on its current operation within the U-space/UTM | |||
| (including means by which the USS under which the UAS is | (including means by which the USS under which the UAS is | |||
| operating may be contacted for further, typically even more | operating may be contacted for further, typically even more | |||
| dynamic, information), and Internet direct contact information | dynamic, information), and Internet direct contact | |||
| for services related to the foregoing. | information for services related to the foregoing. | |||
| REG-4 AAA Policy: DRIP AAA MUST be specifiable by policies; the | REG-4 AAA Policy: DRIP AAA MUST be specifiable by policies; the | |||
| definitive copies of those policies must be accessible in | definitive copies of those policies must be accessible in | |||
| registries; administration of those policies and all DRIP | registries; administration of those policies and all DRIP | |||
| registries must be protected by AAA. | registries must be protected by AAA. | |||
| 4.4.2. Rationale | 4.4.2. Rationale | |||
| Registries are fundamental to RID. Only very limited information can | Registries are fundamental to RID. Only very limited information can | |||
| be Broadcast, but extended information is sometimes needed. The most | be transmitted via Broadcast RID, but extended information is | |||
| essential element of information sent is the UAS ID itself, the | sometimes needed. The most essential element of information sent is | |||
| unique key for lookup of extended information in registries. Beyond | the UAS ID itself, the unique key for lookup of extended information | |||
| designating the UAS ID as that unique key, the registry information | in registries. The regulatory requirements for the registry | |||
| model is not specified herein, in part because regulatory | information models for UAS and their operators for RID and, more | |||
| requirements for different registries (UAS operators and their UA, | broadly, for U-space/UTM needs are in flux. Thus, beyond designating | |||
| each narrowly for UAS RID and broadly for U-space/UTM) and business | the UAS ID as that unique key, the registry information model is not | |||
| models for meeting those requirements are in flux. While it is | specified in this document. While it is expected that registry | |||
| expected that registry functions will be integrated with USS, who | functions will be integrated with USS, who will provide them is | |||
| will provide them is not yet determined in most, and is expected to | expected to vary between jurisdictions and has not yet been | |||
| vary between, jurisdictions. However this evolves, the essential | determined in most jurisdictions. However this evolves, the | |||
| registry functions, starting with management of identifiers, are | essential registry functions, starting with management of | |||
| expected to remain the same, so are specified herein. | identifiers, are expected to remain the same, so those are specified | |||
| herein. | ||||
| While most data to be sent via Broadcast or Network RID is public, | While most data to be sent via Broadcast or Network RID is public, | |||
| much of the extended information in registries will be private. Thus | much of the extended information in registries will be private. | |||
| AAA for registries is essential, not just to ensure that access is | Thus, AAA for registries is essential, not just to ensure that access | |||
| granted only to strongly authenticated, duly authorized parties, but | is granted only to strongly authenticated, duly authorized parties, | |||
| also to support subsequent attribution of any leaks, audit of who | but also to support subsequent attribution of any leaks, audit of who | |||
| accessed information when and for what purpose, etc. As specific AAA | accessed information when and for what purpose, etc. Specific AAA | |||
| requirements will vary by jurisdictional regulation, provider | requirements will vary by jurisdictional regulation, provider | |||
| philosophy, customer demand, etc., they are left to specification in | philosophy, customer demand, etc., so they are left to specification | |||
| policies, which should be human readable to facilitate analysis and | in policies. Such policies should be human readable to facilitate | |||
| discussion, and machine readable to enable automated enforcement, | analysis and discussion, be machine readable to enable automated | |||
| using a language amenable to both, e.g., XACML. | enforcement, and use a language amenable to both, e.g., eXtensible | |||
| Access Control Markup Language (XACML). | ||||
| The intent of the negative and positive access control requirements | The intent of the negative and positive access control requirements | |||
| on registries is to ensure that no member of the public would be | on registries is to ensure that no member of the public would be | |||
| hindered from accessing public information, while only duly | hindered from accessing public information, while only duly | |||
| authorized parties would be enabled to access private information. | authorized parties would be enabled to access private information. | |||
| Mitigation of Denial of Service attacks and refusal to allow database | Mitigation of denial-of-service attacks and refusal to allow database | |||
| mass scraping would be based on those behaviors, not on identity or | mass scraping would be based on those behaviors, not on identity or | |||
| role of the party submitting the query _per se_, but querant identity | role of the party submitting the query per se; however, information | |||
| information might be gathered (by security systems protecting DRIP | on the identity of the party submitting the query might be gathered | |||
| implementations) on such misbehavior. | on such misbehavior by security systems protecting DRIP | |||
| implementations. | ||||
| By "Internet direct contact information" is meant a locator (e.g., IP | "Internet direct contact information" means a locator (e.g., IP | |||
| address), or identifier (e.g., FQDN) that can be resolved to a | address), or identifier (e.g., FQDN) that can be resolved to a | |||
| locator, which would enable initiation of an end-to-end communication | locator, which enables initiation of an end-to-end communication | |||
| session using a well known protocol (e.g., SIP). | session using a well-known protocol (e.g., SIP). | |||
| 5. IANA Considerations | 5. IANA Considerations | |||
| This document does not make any IANA request. | This document has no IANA actions. | |||
| 6. Security Considerations | 6. Security Considerations | |||
| DRIP is all about safety and security, so content pertaining to such | DRIP is all about safety and security, so content pertaining to such | |||
| is not limited to this section. This document does not define any | is not limited to this section. This document does not define any | |||
| protocols, so security considerations of such are speculative. | protocols, so security considerations of such are speculative. | |||
| Potential vulnerabilities of DRIP solutions to these requirements | Potential vulnerabilities of DRIP solutions to these requirements | |||
| include but are not limited to: | include but are not limited to: | |||
| * Sybil attacks | * Sybil attacks | |||
| * confusion created by many spoofed unsigned messages | * confusion created by many spoofed unsigned messages | |||
| * processing overload induced by attempting to verify many spoofed | * processing overload induced by attempting to verify many spoofed | |||
| signed messages (where verification will fail but still consume | signed messages (where verification will fail but still consume | |||
| cycles) | cycles) | |||
| * malicious or malfunctioning registries | * malicious or malfunctioning registries | |||
| * interception by on-path attacker of (i.e., Man In The Middle | * interception by on-path attacker of (i.e., man-in-the-middle | |||
| attacks on) registration messages | attacks on) registration messages | |||
| * UA impersonation through private key extraction, improper key | * UA impersonation through private key extraction, improper key | |||
| sharing, or carriage of a small (presumably harmless) UA, i.e., as | sharing, or carriage of a small (presumably harmless) UA, i.e., as | |||
| a "false flag", by a larger (malicious) UA | a "false flag", by a larger (malicious) UA | |||
| It may be inferred from the general requirements (Section 4.1) for | It may be inferred from the General requirements (Section 4.1) for | |||
| provable ownership, provable binding, and provable registration, | Provable Ownership, Provable Binding, and Provable Registration, | |||
| together with the identifier requirements (Section 4.2), that DRIP | together with the Identifier requirements (Section 4.2), that DRIP | |||
| must provide: | must provide: | |||
| * message integrity | * message integrity | |||
| * non-repudiation | * non-repudiation | |||
| * defense against replay attacks | * defense against replay attacks | |||
| * defense against spoofing | * defense against spoofing | |||
| skipping to change at page 40, line 34 ¶ | skipping to change at line 1944 ¶ | |||
| whether via this approach or another, is likely to be especially | whether via this approach or another, is likely to be especially | |||
| challenging for Observers without Internet connectivity at the time | challenging for Observers without Internet connectivity at the time | |||
| of observation. For example, checking the signature of a registry on | of observation. For example, checking the signature of a registry on | |||
| a public key certificate received via Broadcast RID in a remote area | a public key certificate received via Broadcast RID in a remote area | |||
| presumably would require that the registry's public key had been | presumably would require that the registry's public key had been | |||
| previously installed on the Observer's device, yet there may be many | previously installed on the Observer's device, yet there may be many | |||
| registries and the Observer's device may be storage constrained, and | registries and the Observer's device may be storage constrained, and | |||
| new registries may come on-line subsequent to installation of DRIP | new registries may come on-line subsequent to installation of DRIP | |||
| software on the Observer's device. See also Figure 1 and the | software on the Observer's device. See also Figure 1 and the | |||
| associated explanatory text, especially the second paragraph after | associated explanatory text, especially the second paragraph after | |||
| the figure. Thus there may be caveats on the extent to which | the figure. Thus, there may be caveats on the extent to which | |||
| requirements can be satisfied in such cases, yet strenuous effort | requirements can be satisfied in such cases, yet strenuous effort | |||
| should be made to satisfy them, as such cases, e.g., firefighting in | should be made to satisfy them, as such cases are important, e.g., | |||
| a national forest, are important. Each numbered requirement _a | firefighting in a national forest. Each numbered requirement a | |||
| priori_ expected to suffer from such limitations (General | priori expected to suffer from such limitations (General requirements | |||
| requirements for Gateway and Contact functionality) contains language | for Gateway and Contact functionality) contains language stating when | |||
| stating when it applies. | it applies. | |||
| 7. Privacy and Transparency Considerations | 7. Privacy and Transparency Considerations | |||
| Privacy and transparency are important for legal reasons including | Privacy and transparency are important for legal reasons including | |||
| regulatory consistency. [EU2018] states "harmonised and | regulatory consistency. [EU2018] states: | |||
| interoperable national registration systems... should comply with the | ||||
| applicable Union and national law on privacy and processing of | | harmonised and interoperable national registration systems ... | |||
| personal data, and the information stored in those registration | | should comply with the applicable Union and national law on | |||
| systems should be easily accessible." | | privacy and processing of personal data, and the information | |||
| Privacy and transparency (where essential to security or safety) are | | stored in those registration systems should be easily accessible. | |||
| Transparency (where essential to security or safety) and privacy are | ||||
| also ethical and moral imperatives. Even in cases where old | also ethical and moral imperatives. Even in cases where old | |||
| practices (e.g., automobile registration plates) could be imitated, | practices (e.g., automobile registration plates) could be imitated, | |||
| when new applications involving PII (such as UAS RID) are addressed | when new applications involving PII (such as UAS RID) are addressed | |||
| and newer technologies could enable improving privacy, such | and newer technologies could enable improving privacy, such | |||
| opportunities should not be squandered. Thus it is recommended that | opportunities should not be squandered. Thus, it is recommended that | |||
| all DRIP work give due regard to [RFC6973] and more broadly | all DRIP work give due regard to [RFC6973] and, more broadly, to | |||
| [RFC8280]. | [RFC8280]. | |||
| However, privacy and transparency are often conflicting goals, | However, privacy and transparency are often conflicting goals, | |||
| demanding careful attention to their balance. | demanding careful attention to their balance. | |||
| DRIP information falls into two classes: that which, to achieve the | DRIP information falls into two classes: | |||
| purpose, must be published openly as cleartext, for the benefit of | ||||
| any Observer (e.g., the basic UAS ID itself); and that which must be | * that which, to achieve the purpose, must be published openly as | |||
| protected (e.g., PII of pilots) but made available to properly | cleartext, for the benefit of any Observer (e.g., the basic UAS ID | |||
| authorized parties (e.g., public safety personnel who urgently need | itself); and | |||
| to contact pilots in emergencies). | ||||
| * that which must be protected (e.g., PII of pilots) but made | ||||
| available to properly authorized parties (e.g., public safety | ||||
| personnel who urgently need to contact pilots in emergencies). | ||||
| How properly authorized parties are authorized, authenticated, etc. | How properly authorized parties are authorized, authenticated, etc. | |||
| are questions that extend beyond the scope of DRIP, but DRIP may be | are questions that extend beyond the scope of DRIP, but DRIP may be | |||
| able to provide support for such processes. Classification of | able to provide support for such processes. Classification of | |||
| information as public or private must be made explicit and reflected | information as public or private must be made explicit and reflected | |||
| with markings, design, etc. Classifying the information will be | with markings, design, etc. Classifying the information will be | |||
| addressed primarily in external standards; herein it will be regarded | addressed primarily in external standards; in this document, it will | |||
| as a matter for CAA, registry, and operator policies, for which | be regarded as a matter for CAA, registry, and operator policies, for | |||
| enforcement mechanisms will be defined within the scope of DRIP WG | which enforcement mechanisms will be defined within the scope of the | |||
| and offered. Details of the protection mechanisms will be provided | DRIP WG and offered. Details of the protection mechanisms will be | |||
| in other DRIP documents. Mitigation of adversarial correlation will | provided in other DRIP documents. Mitigation of adversarial | |||
| also be addressed. | correlation will also be addressed. | |||
| 8. References | 8. References | |||
| 8.1. Normative References | 8.1. Normative References | |||
| [F3411-19] ASTM International, "Standard Specification for Remote ID | [F3411-19] ASTM International, "Standard Specification for Remote ID | |||
| and Tracking", February 2020, | and Tracking", ASTM F3411-19, DOI 10.1520/F3411-19, | |||
| February 2020, | ||||
| <http://www.astm.org/cgi-bin/resolver.cgi?F3411>. | <http://www.astm.org/cgi-bin/resolver.cgi?F3411>. | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| 8.2. Informative References | 8.2. Informative References | |||
| [Amended] European Union Aviation Safety Agency (EASA), "Commission | [Amended] European Parliament and Council, "Commission Delegated | |||
| Delegated Regulation (EU) 2020/1058 of 27 April 2020 | Regulation (EU) 2020/1058 of 27 April 2020 amending | |||
| amending Delegated Regulation (EU) 2019/945", April 2020, | Delegated Regulation (EU) 2019/945 as regards the | |||
| <https://eur-lex.europa.eu/legal-content/EN/ | introduction of two new unmanned aircraft systems | |||
| TXT/?uri=CELEX%3A32020R1058>. | classes", April 2020, | |||
| <https://eur-lex.europa.eu/eli/reg_del/2020/1058/oj>. | ||||
| [ASDRI] ASD-STAN, "Introduction to the European UAS Digital Remote | [ASDRI] ASD-STAN, "Introduction to the European UAS Digital Remote | |||
| ID Technical Standard", January 2021, <https://asd- | ID Technical Standard", January 2021, <https://asd- | |||
| stan.org/wp-content/uploads/ASD-STAN_DRI_Introduction_to_t | stan.org/wp-content/uploads/ASD-STAN_DRI_Introduction_to_t | |||
| he_European_digital_RID_UAS_Standard.pdf>. | he_European_digital_RID_UAS_Standard.pdf>. | |||
| [ASDSTAN4709-002] | ||||
| ASD-STAN, "Aerospace series - Unmanned Aircraft Systems - | ||||
| Part 002: Direct Remote Identification", ASD-STAN | ||||
| prEN 4709-002 P1, October 2021, <https://asd- | ||||
| stan.org/downloads/asd-stan-pren-4709-002-p1/>. | ||||
| [CPDLC] Gurtov, A., Polishchuk, T., and M. Wernberg, "Controller- | [CPDLC] Gurtov, A., Polishchuk, T., and M. Wernberg, "Controller- | |||
| Pilot Data Link Communication Security", MDPI | Pilot Data Link Communication Security", Sensors 18, no. | |||
| Sensors 18(5), 1636, 2018, | 5: 1636, DOI 10.3390/s18051636, 2018, | |||
| <https://www.mdpi.com/1424-8220/18/5/1636>. | <https://www.mdpi.com/1424-8220/18/5/1636>. | |||
| [CTA2063A] ANSI, "Small Unmanned Aerial Systems Serial Numbers", | [CTA2063A] ANSI, "Small Unmanned Aerial Systems Serial Numbers", | |||
| September 2019, <https://shop.cta.tech/products/small- | ANSI/CTA 2063-A, September 2019, | |||
| unmanned-aerial-systems-serial-numbers>. | <https://shop.cta.tech/products/small-unmanned-aerial- | |||
| systems-serial-numbers>. | ||||
| [Delegated] | [Delegated] | |||
| European Union Aviation Safety Agency (EASA), "Commission | European Parliament and Council, "Commission Delegated | |||
| Delegated Regulation (EU) 2019/945 of 12 March 2019 on | Regulation (EU) 2019/945 of 12 March 2019 on unmanned | |||
| unmanned aircraft systems and on third-country operators | aircraft systems and on third-country operators of | |||
| of unmanned aircraft systems", March 2019, | unmanned aircraft systems", March 2019, | |||
| <https://eur-lex.europa.eu/eli/reg_del/2019/945/oj>. | <https://eur-lex.europa.eu/eli/reg_del/2019/945/oj>. | |||
| [drip-architecture] | [DRIP-ARCH] | |||
| Card, S. W., Wiethuechter, A., Moskowitz, R., Zhao, S., | Card, S., Wiethuechter, A., Moskowitz, R., Zhao, S., Ed., | |||
| and A. Gurtov, "Drone Remote Identification Protocol | and A. Gurtov, "Drone Remote Identification Protocol | |||
| (DRIP) Architecture", Work in Progress, Internet-Draft, | (DRIP) Architecture", Work in Progress, Internet-Draft, | |||
| draft-ietf-drip-arch-15, 25 July 2021, | draft-ietf-drip-arch-20, 28 January 2022, | |||
| <https://datatracker.ietf.org/doc/html/draft-ietf-drip- | <https://datatracker.ietf.org/doc/html/draft-ietf-drip- | |||
| arch-15>. | arch-20>. | |||
| [ENISACSIRT] | [ENISACSIRT] | |||
| European Union Agency for Cybersecurity (ENISA), | European Union Agency for Cybersecurity (ENISA), | |||
| "Actionable information for Security Incident Response", | "Actionable information for Security Incident Response", | |||
| November 2014, <https://www.enisa.europa.eu/topics/csirt- | November 2014, <https://www.enisa.europa.eu/topics/csirt- | |||
| cert-services/reactive-services/copy_of_actionable- | cert-services/reactive-services/copy_of_actionable- | |||
| information>. | information/actionable-information>. | |||
| [EU2018] European Parliament and Council, "2015/0277 (COD) PE-CONS | [EU2018] European Parliament and Council, "2015/0277 (COD) PE-CONS | |||
| 2/18", February 2018, | 2/18", June 2018, | |||
| <https://www.consilium.europa.eu/media/35805/easa- | <https://www.consilium.europa.eu/media/35805/easa- | |||
| regulation-june-2018.pdf>. | regulation-june-2018.pdf>. | |||
| [FAACONOPS] | [FAACONOPS] | |||
| FAA Office of NextGen, "UTM Concept of Operations v2.0", | FAA Office of NextGen, "UTM Concept of Operations v2.0", | |||
| March 2020, <https://www.faa.gov/uas/research_development/ | March 2020, <https://www.faa.gov/uas/research_development/ | |||
| traffic_management/media/UTM_ConOps_v2.pdf>. | traffic_management/media/UTM_ConOps_v2.pdf>. | |||
| [FR24] Flightradar24 AB, "Flightradar24 Live Air Traffic", May | [FR24] Flightradar24, "About Flightradar24", | |||
| 2021, <https://www.flightradar24.com/about>. | <https://www.flightradar24.com/about>. | |||
| [FRUR] Federal Aviation Administration, "Remote Identification of | [FRUR] Federal Aviation Administration (FAA), "Remote | |||
| Unmanned Aircraft", January 2021, | Identification of Unmanned Aircraft", January 2021, | |||
| <https://www.federalregister.gov/ | <https://www.federalregister.gov/ | |||
| documents/2021/01/15/2020-28948/remote-identification-of- | documents/2021/01/15/2020-28948/remote-identification-of- | |||
| unmanned-aircraft>. | unmanned-aircraft>. | |||
| [GDPR] European Parliament and Council, "General Data Protection | [GDPR] European Parliament and Council, "Regulation (EU) 2016/679 | |||
| Regulation", April 2016, | of the European Parliament and of the Council of 27 April | |||
| 2016 on the protection of natural persons with regard to | ||||
| the processing of personal data and on the free movement | ||||
| of such data, and repealing Directive 95/46/EC (General | ||||
| Data Protection Regulation)", April 2016, | ||||
| <https://eur-lex.europa.eu/eli/reg/2016/679/oj>. | <https://eur-lex.europa.eu/eli/reg/2016/679/oj>. | |||
| [I-D.ietf-raw-ldacs] | [ICAOATM] International Civil Aviation Organization, "Procedures for | |||
| Maeurer, N., Graeupl, T., and C. Schmitt, "L-band Digital | Air Navigation Services: Air Traffic Management", | |||
| Aeronautical Communications System (LDACS)", Work in | Doc 4444, November 2016, <https://store.icao.int/en/ | |||
| Progress, Internet-Draft, draft-ietf-raw-ldacs-08, 10 May | ||||
| 2021, <https://datatracker.ietf.org/doc/html/draft-ietf- | ||||
| raw-ldacs-08>. | ||||
| [ICAOATM] International Civil Aviation Organization, "Doc 4444: | ||||
| Procedures for Air Navigation Services: Air Traffic | ||||
| Management", November 2016, <https://store.icao.int/en/ | ||||
| procedures-for-air-navigation-services-air-traffic- | procedures-for-air-navigation-services-air-traffic- | |||
| management-doc-4444>. | management-doc-4444>. | |||
| [ICAODEFS] International Civil Aviation Organization, "Defined terms | [ICAODEFS] International Civil Aviation Organization, "Defined terms | |||
| from the Annexes to the Chicago Convention and ICAO | from the Annexes to the Chicago Convention and ICAO | |||
| guidance material", July 2017, | guidance material", July 2017, | |||
| <https://www.icao.int/safety/cargosafety/Documents/ | <https://www.icao.int/safety/cargosafety/Documents/ | |||
| Draft%20Glossary%20of%20terms.docx>. | Draft%20Glossary%20of%20terms.docx>. | |||
| [ICAOUAS] International Civil Aviation Organization, "Circular 328: | [ICAOUAS] International Civil Aviation Organization, "Unmanned | |||
| Unmanned Aircraft Systems", February 2011, | Aircraft Systems", Circular 328, 2011, | |||
| <https://www.icao.int/meetings/uas/documents/ | <https://www.icao.int/meetings/uas/documents/ | |||
| circular%20328_en.pdf>. | circular%20328_en.pdf>. | |||
| [ICAOUTM] International Civil Aviation Organization, "Unmanned | [ICAOUTM] International Civil Aviation Organization, "Unmanned | |||
| Aircraft Systems Traffic Management (UTM) - A Common | Aircraft Systems Traffic Management (UTM) - A Common | |||
| Framework with Core Principles for Global Harmonization, | Framework with Core Principles for Global Harmonization, | |||
| Edition 3", October 2020, | Edition 3", October 2020, | |||
| <https://www.icao.int/safety/UA/Documents/ | <https://www.icao.int/safety/UA/Documents/ | |||
| UTM%20Framework%20Edition%203.pdf>. | UTM%20Framework%20Edition%203.pdf>. | |||
| [Implementing] | [Implementing] | |||
| European Union Aviation Safety Agency (EASA), "Commission | European Parliament and Council, "Commission Implementing | |||
| Implementing Regulation (EU) 2019/947 of 24 May 2019 on | Regulation (EU) 2019/947 of 24 May 2019 on the rules and | |||
| the rules and procedures for the operation of unmanned | procedures for the operation of unmanned aircraft", May | |||
| aircraft", May 2019, | 2019, | |||
| <https://eur-lex.europa.eu/eli/reg_impl/2019/947/oj>. | <https://eur-lex.europa.eu/eli/reg_impl/2019/947/oj>. | |||
| [InitialView] | [InitialView] | |||
| SESAR Joint Undertaking, "Initial view on Principles for | SESAR Joint Undertaking, "Initial view on Principles for | |||
| the U-space architecture", July 2019, | the U-space architecture", July 2019, | |||
| <https://www.sesarju.eu/sites/default/files/documents/u- | <https://www.sesarju.eu/sites/default/files/documents/u- | |||
| space/SESAR%20principles%20for%20U- | space/SESAR%20principles%20for%20U- | |||
| space%20architecture.pdf>. | space%20architecture.pdf>. | |||
| [LDACS] Maeurer, N., Ed., Graeupl, T., Ed., and C. Schmitt, Ed., | ||||
| "L-band Digital Aeronautical Communications System | ||||
| (LDACS)", Work in Progress, Internet-Draft, draft-ietf- | ||||
| raw-ldacs-09, 22 October 2021, | ||||
| <https://datatracker.ietf.org/doc/html/draft-ietf-raw- | ||||
| ldacs-09>. | ||||
| [NPRM] United States Federal Aviation Administration (FAA), | [NPRM] United States Federal Aviation Administration (FAA), | |||
| "Notice of Proposed Rule Making on Remote Identification | "Notice of Proposed Rule Making on Remote Identification | |||
| of Unmanned Aircraft Systems", December 2019, | of Unmanned Aircraft Systems", December 2019, | |||
| <https://www.federalregister.gov/ | <https://www.federalregister.gov/ | |||
| documents/2019/12/31/2019-28100/remote-identification-of- | documents/2019/12/31/2019-28100/remote-identification-of- | |||
| unmanned-aircraft-systems>. | unmanned-aircraft-systems>. | |||
| [OpenDroneID] | [OpenDroneID] | |||
| Intel Corp., "Open Drone ID", March 2019, | "The Open Drone ID specification", commit c4c8bb8, March | |||
| <https://github.com/opendroneid/specs>. | 2020, <https://github.com/opendroneid/specs>. | |||
| [OpenSky] OpenSky Network non-profit association, "The OpenSky | [OpenSky] OpenSky Network, "About the OpenSky Network", | |||
| Network", May 2021, | ||||
| <https://opensky-network.org/about/about-us>. | <https://opensky-network.org/about/about-us>. | |||
| [Opinion1] European Union Aviation Safety Agency (EASA), "Opinion No | [Opinion1] European Union Aviation Safety Agency (EASA), "High-level | |||
| 01/2020: High-level regulatory framework for the U-space", | regulatory framework for the U-space", Opinion No 01/2020, | |||
| March 2020, <https://www.easa.europa.eu/document- | March 2020, <https://www.easa.europa.eu/document- | |||
| library/opinions/opinion-012020>. | library/opinions/opinion-012020>. | |||
| [Part107] United States Federal Aviation Administration, "Code of | [Part107] Code of Federal Regulations, "Part 107 - SMALL UNMANNED | |||
| Federal Regulations Part 107", June 2016, | AIRCRAFT SYSTEMS", June 2016, | |||
| <https://www.ecfr.gov/cgi-bin/text-idx?node=pt14.2.107>. | <https://www.ecfr.gov/cgi-bin/text-idx?node=pt14.2.107>. | |||
| [Recommendations] | [Recommendations] | |||
| FAA UAS Identification and Tracking Aviation Rulemaking | FAA UAS Identification and Tracking (UAS ID) Aviation | |||
| Committee, "UAS ID and Tracking ARC Recommendations Final | Rulemaking Committee (ARC), "UAS Identification and | |||
| Report", September 2017, <https://www.faa.gov/regulations_ | Tracking (UAS ID) Aviation Rulemaking Committee (ARC): ARC | |||
| policies/rulemaking/committees/documents/media/ | Recommendations Final Report", September 2017, <https://ww | |||
| w.faa.gov/regulations_policies/rulemaking/committees/ | ||||
| documents/media/ | ||||
| UAS%20ID%20ARC%20Final%20Report%20with%20Appendices.pdf>. | UAS%20ID%20ARC%20Final%20Report%20with%20Appendices.pdf>. | |||
| [RFC4122] Leach, P., Mealling, M., and R. Salz, "A Universally | [RFC4122] Leach, P., Mealling, M., and R. Salz, "A Universally | |||
| Unique IDentifier (UUID) URN Namespace", RFC 4122, | Unique IDentifier (UUID) URN Namespace", RFC 4122, | |||
| DOI 10.17487/RFC4122, July 2005, | DOI 10.17487/RFC4122, July 2005, | |||
| <https://www.rfc-editor.org/info/rfc4122>. | <https://www.rfc-editor.org/info/rfc4122>. | |||
| [RFC4949] Shirey, R., "Internet Security Glossary, Version 2", | [RFC4949] Shirey, R., "Internet Security Glossary, Version 2", | |||
| FYI 36, RFC 4949, DOI 10.17487/RFC4949, August 2007, | FYI 36, RFC 4949, DOI 10.17487/RFC4949, August 2007, | |||
| <https://www.rfc-editor.org/info/rfc4949>. | <https://www.rfc-editor.org/info/rfc4949>. | |||
| skipping to change at page 45, line 37 ¶ | skipping to change at line 2202 ¶ | |||
| <https://www.rfc-editor.org/info/rfc7401>. | <https://www.rfc-editor.org/info/rfc7401>. | |||
| [RFC8280] ten Oever, N. and C. Cath, "Research into Human Rights | [RFC8280] ten Oever, N. and C. Cath, "Research into Human Rights | |||
| Protocol Considerations", RFC 8280, DOI 10.17487/RFC8280, | Protocol Considerations", RFC 8280, DOI 10.17487/RFC8280, | |||
| October 2017, <https://www.rfc-editor.org/info/rfc8280>. | October 2017, <https://www.rfc-editor.org/info/rfc8280>. | |||
| [RFC9063] Moskowitz, R., Ed. and M. Komu, "Host Identity Protocol | [RFC9063] Moskowitz, R., Ed. and M. Komu, "Host Identity Protocol | |||
| Architecture", RFC 9063, DOI 10.17487/RFC9063, July 2021, | Architecture", RFC 9063, DOI 10.17487/RFC9063, July 2021, | |||
| <https://www.rfc-editor.org/info/rfc9063>. | <https://www.rfc-editor.org/info/rfc9063>. | |||
| [Roadmap] American National Standards Institute (ANSI) Unmanned | [Roadmap] ANSI Unmanned Aircraft Systems Standardization | |||
| Aircraft Systems Standardization Collaborative (UASSC), | Collaborative (UASSC), "Standardization Roadmap for | |||
| "Standardization Roadmap for Unmanned Aircraft Systems | Unmanned Aircraft Systems", Working Draft, Version 2.0, | |||
| draft v2.0", April 2020, <https://share.ansi.org/Shared | April 2020, <https://share.ansi.org/Shared Documents/ | |||
| Documents/Standards Activities/UASSC/ | Standards Activities/UASSC/ | |||
| UASSC_20-001_WORKING_DRAFT_ANSI_UASSC_Roadmap_v2.pdf>. | UASSC_20-001_WORKING_DRAFT_ANSI_UASSC_Roadmap_v2.pdf>. | |||
| [Stranger] Heinlein, R.A., "Stranger in a Strange Land", June 1961. | [Stranger] Heinlein, R., "Stranger in a Strange Land", June 1961. | |||
| [WG105] EUROCAE, "WG-105 draft ED-282 Minimum Operational | [WG105] EUROCAE, "Minimum Operational Performance Standards (MOPS) | |||
| Performance Standards (MOPS) for Unmanned Aircraft System | for Unmanned Aircraft System (UAS) Electronic | |||
| (UAS) Electronic Identification", June 2020. | Identification", WG-105 SG-32 draft ED-282, June 2020. | |||
| [WiFiNAN] Wi-Fi Alliance, "Wi-Fi Aware™ Specification Version 3.2", | [WiFiNAN] Wi-Fi Alliance, "Wi-Fi Aware", October 2020, | |||
| October 2020, <https://www.wi-fi.org/downloads-registered- | <https://www.wi-fi.org/discover-wi-fi/wi-fi-aware>. | |||
| guest/Wi-Fi_Aware_Specification_v3.2.pdf/29731>. | ||||
| Appendix A. Discussion and Limitations | Appendix A. Discussion and Limitations | |||
| This document is largely based on the process of one SDO, ASTM. | This document is largely based on the process of one SDO -- ASTM. | |||
| Therefore, it is tailored to specific needs and data formats of this | Therefore, it is tailored to specific needs and data formats of | |||
| standard. Other organizations, for example in EU, do not necessarily | ASTM's "Standard Specification for Remote ID and Tracking" | |||
| follow the same architecture. | [F3411-19]. Other organizations (for example, in the EU) do not | |||
| necessarily follow the same architecture. | ||||
| The need for drone ID and operator privacy is an open discussion | The need for drone ID and operator privacy is an open discussion | |||
| topic. For instance, in the ground vehicular domain each car carries | topic. For instance, in the ground vehicular domain, each car | |||
| a publicly visible plate number. In some countries, for nominal cost | carries a publicly visible plate number. In some countries, for | |||
| or even for free, anyone can resolve the identity and contact | nominal cost or even for free, anyone can resolve the identity and | |||
| information of the owner. Civil commercial aviation and maritime | contact information of the owner. Civil commercial aviation and | |||
| industries also have a tradition of broadcasting plane or ship ID, | maritime industries also have a tradition of broadcasting plane or | |||
| coordinates, and even flight plans in plain text. Community networks | ship ID, coordinates, and even flight plans in plaintext. Community | |||
| such as OpenSky [OpenSky] and Flightradar24 [FR24] use this open | networks such as OpenSky [OpenSky] and Flightradar24 [FR24] use this | |||
| information through ADS-B to deploy public services of flight | open information through ADS-B to deploy public services of flight | |||
| tracking. Many researchers also use these data to perform | tracking. Many researchers also use these data to perform | |||
| optimization of routes and airport operations. Such ID information | optimization of routes and airport operations. Such ID information | |||
| should be integrity protected, but not necessarily confidential. | should be integrity protected, but not necessarily confidential. | |||
| In civil aviation, aircraft identity is broadcast by a device known | In civil aviation, aircraft identity is broadcast by a device known | |||
| as transponder. It transmits a four octal digit squawk code, which | as transponder. It transmits a four-octal digit squawk code, which | |||
| is assigned by a traffic controller to an airplane after approving a | is assigned by a traffic controller to an airplane after approving a | |||
| flight plan. There are several reserved codes such as 7600 which | flight plan. There are several reserved codes, such as 7600, that | |||
| indicate radio communication failure. The codes are unique in each | indicate radio communication failure. The codes are unique in each | |||
| traffic area and can be re-assigned when entering another control | traffic area and can be re-assigned when entering another control | |||
| area. The code is transmitted in plain text by the transponder and | area. The code is transmitted in plaintext by the transponder and | |||
| also used for collision avoidance by a system known as Traffic alert | also used for collision avoidance by a system known as Traffic alert | |||
| and Collision Avoidance System (TCAS). The system could be used for | and Collision Avoidance System (TCAS). The system could be used for | |||
| UAS as well initially, but the code space is quite limited and likely | UAS as well initially, but the code space is quite limited and likely | |||
| to be exhausted soon. The number of UAS far exceeds the number of | to be exhausted soon. The number of UAS far exceeds the number of | |||
| civil airplanes in operation. | civil airplanes in operation. | |||
| The ADS-B system is utilized in civil aviation for each "ADS-B Out" | The ADS-B system is utilized in civil aviation for each "ADS-B Out" | |||
| equipped airplane to broadcast its ID, coordinates, and altitude for | equipped airplane to broadcast its ID, coordinates, and altitude for | |||
| other airplanes and ground control stations. If this system is | other airplanes and ground control stations. If this system is | |||
| adopted for drone IDs, it has additional benefit with backward | adopted for drone IDs, it has additional benefit with backward | |||
| compatibility with civil aviation infrastructure; then, pilots and | compatibility with civil aviation infrastructure; then, pilots and | |||
| dispatchers will be able to see UA on their control screens and take | dispatchers will be able to see UA on their control screens and take | |||
| those into account. If not, a gateway translation system between the | those into account. If not, a gateway translation system between the | |||
| proposed drone ID and civil aviation system should be implemented. | proposed drone ID and civil aviation system should be implemented. | |||
| Again, system saturation due to large numbers of UAS is a concern. | Again, system saturation due to large numbers of UAS is a concern. | |||
| The Mode S transponders used in all TCAS and most ADS-B Out | The Mode S transponders used in all TCAS and most "ADS-B Out" | |||
| installations are assigned an ICAO 24 bit "address" (arguably really | installations are assigned an ICAO 24-bit "address" (arguably really | |||
| an identifier rather than a locator) that is associated with the | an identifier rather than a locator) that is associated with the | |||
| aircraft as part of its registration. In the US alone, well over | aircraft as part of its registration. In the US alone, well over | |||
| 2^20 UAS are already flying; thus, a 24 bit space likely would be | 2^20 UAS are already flying; thus, a 24-bit space likely would be | |||
| rapidly exhausted if used for UAS (other than large UAS flying in | rapidly exhausted if used for UAS (other than large UAS flying in | |||
| controlled airspace, especially internationally, under rules other | controlled airspace, especially internationally, under rules other | |||
| than those governing small UAS at low altitudes). | than those governing small UAS at low altitudes). | |||
| Wi-Fi and Bluetooth are two wireless technologies currently | Wi-Fi and Bluetooth are two wireless technologies currently | |||
| recommended by ASTM specifications due to their widespread use and | recommended by ASTM specifications due to their widespread use and | |||
| broadcast nature. However, those have limited range (max 100s of | broadcast nature. However, those have limited range (max 100s of | |||
| meters) and may not reliably deliver UAS ID at high altitude or | meters) and may not reliably deliver UAS ID at high altitude or | |||
| distance. Therefore, a study should be made of alternative | distance. Therefore, a study should be made of alternative | |||
| technologies from the telecom domain (WiMAX / IEEE 802.16, 5G) or | technologies from the telecom domain (e.g., WiMAX / IEEE 802.16, 5G) | |||
| sensor networks (Sigfox, LoRa). Such transmission technologies can | or sensor networks (e.g., Sigfox, LoRa). Such transmission | |||
| impose additional restrictions on packet sizes and frequency of | technologies can impose additional restrictions on packet sizes and | |||
| transmissions, but could provide better energy efficiency and range. | frequency of transmissions but could provide better energy efficiency | |||
| and range. | ||||
| In civil aviation, Controller-Pilot Data Link Communications (CPDLC) | In civil aviation, Controller-Pilot Data Link Communications (CPDLC) | |||
| is used to transmit command and control between the pilots and ATC. | is used to transmit command and control between the pilots and ATC. | |||
| It could be considered for UAS as well due to long range and proven | It could be considered for UAS as well due to long-range and proven | |||
| use despite its lack of security [CPDLC]. | use despite its lack of security [CPDLC]. | |||
| L-band Digital Aeronautical Communications System (LDACS) is being | L-band Digital Aeronautical Communications System (LDACS) is being | |||
| standardized by ICAO and IETF for use in future civil aviation | standardized by ICAO and IETF for use in future civil aviation | |||
| [I-D.ietf-raw-ldacs]. It provides secure communication, positioning, | [LDACS]. LDACS provides secure communication, positioning, and | |||
| and control for aircraft using a dedicated radio band. It should be | control for aircraft using a dedicated radio band. It should be | |||
| analyzed as a potential provider for UAS RID as well. This will | analyzed as a potential provider for UAS RID as well. This will | |||
| bring the benefit of a global integrated system creating a global | bring the benefit of a global integrated system creating awareness of | |||
| airspace use awareness. | global airspace use. | |||
| Acknowledgments | Acknowledgments | |||
| The work of the FAA's UAS Identification and Tracking (UAS ID) | The work of the FAA's UAS Identification and Tracking Aviation | |||
| Aviation Rulemaking Committee (ARC) is the foundation of later ASTM | Rulemaking Committee (ARC) is the foundation of later ASTM [F3411-19] | |||
| [F3411-19] and IETF DRIP efforts. The work of Gabriel Cox, Intel | and IETF DRIP efforts. The work of Gabriel Cox, Intel Corp., and | |||
| Corp., and their Open Drone ID collaborators opened UAS RID to a | their Open Drone ID collaborators opened UAS RID to a wider | |||
| wider community. The work of ASTM F38.02 in balancing the interests | community. The work of ASTM F38.02 in balancing the interests of | |||
| of diverse stakeholders is essential to the necessary rapid and | diverse stakeholders is essential to the necessary rapid and | |||
| widespread deployment of UAS RID. IETF volunteers who have | widespread deployment of UAS RID. IETF volunteers who have | |||
| extensively reviewed or otherwise contributed to this document | extensively reviewed or otherwise contributed to this document | |||
| include Amelia Andersdotter, Carsten Bormann, Toerless Eckert, Susan | include Amelia Andersdotter, Carsten Bormann, Toerless Eckert, Susan | |||
| Hares, Mika Jarvenpaa, Alexandre Petrescu, Saulo Da Silva and Shuai | Hares, Mika Jarvenpaa, Alexandre Petrescu, Saulo Da Silva, and Shuai | |||
| Zhao. Thanks to Linda Dunbar for the Secdir review, Nagendra Nainar | Zhao. Thanks to Linda Dunbar for the SECDIR review, Nagendra Nainar | |||
| for the Opsdir review and Suresh Krishnan for the Gen-ART review. | for the OPSDIR review, and Suresh Krishnan for the Gen-ART review. | |||
| Thanks to IESG members Roman Danyliw, Erik Kline, Murray Kucherawy | Thanks to IESG members Roman Danyliw, Erik Kline, Murray Kucherawy, | |||
| and Robert Wilton for helpful and positive comments. Thanks to | and Robert Wilton for helpful and positive comments. Thanks to | |||
| chairs Daniel Migault and Mohamed Boucadair for direction of our team | chairs Daniel Migault and Mohamed Boucadair for direction of our team | |||
| of authors and editor, some of whom are newcomers to writing IETF | of authors and editor, some of whom are newcomers to writing IETF | |||
| documents. Thanks especially to Internet Area Director Eric Vyncke | documents. Thanks especially to Internet Area Director Éric Vyncke | |||
| for guidance and support. | for guidance and support. | |||
| This work was partly supported by the EU project AiRMOUR (enabling | ||||
| sustainable air mobility in urban contexts via emergency and medical | ||||
| services) under grant agreement no. 101006601. | ||||
| Authors' Addresses | Authors' Addresses | |||
| Stuart W. Card (editor) | Stuart W. Card (editor) | |||
| AX Enterprize | AX Enterprize | |||
| 4947 Commercial Drive | 4947 Commercial Drive | |||
| Yorkville, NY 13495 | Yorkville, NY 13495 | |||
| United States of America | United States of America | |||
| Email: stu.card@axenterprize.com | Email: stu.card@axenterprize.com | |||
| End of changes. 291 change blocks. | ||||
| 973 lines changed or deleted | 1091 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||